CVE-2025-20383: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and below 3.9.10, 3.8.58, and 3.7.28 of Splunk Secure Gateway app in Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles and subscribes to mobile push notifications could receive notifications that disclose the title and description of the report or alert even if they do not have access to view the report or alert.
AI Analysis
Technical Summary
CVE-2025-20383 is a vulnerability affecting multiple versions of Splunk Enterprise (below 10.0.2, 9.4.6, 9.3.8, and 9.2.10) and the Splunk Secure Gateway app (below 3.9.10, 3.8.58, and 3.7.28) used in the Splunk Cloud Platform. The flaw arises because low-privileged users who subscribe to mobile push notifications can receive notifications containing the title and description of reports or alerts, even if they lack explicit permissions to view those reports or alerts. This results in unauthorized disclosure of sensitive information, potentially revealing operational details or security-related alerts that should be restricted. The vulnerability does not allow modification or deletion of data, nor does it affect availability, but it compromises confidentiality. Exploitation requires the user to have a Splunk account with at least low privileges and to be subscribed to mobile push notifications, but no further user interaction is needed. The attack vector is network-based, and the vulnerability has a CVSS 3.1 score of 4.3, reflecting a medium severity level. No known exploits have been reported in the wild, but the exposure of sensitive alert metadata could aid attackers in planning further attacks or insider threat actors in gathering intelligence. The issue is resolved in later versions of Splunk Enterprise and the Secure Gateway app, so patching is the primary remediation.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive operational or security information leakage to unauthorized users within the organization or potentially compromised accounts. The exposure of alert titles and descriptions could reveal details about security incidents, system status, or business operations, which attackers could leverage for targeted attacks or social engineering. While it does not allow direct system compromise or data manipulation, the confidentiality breach can undermine trust and compliance with data protection regulations such as GDPR. Organizations relying heavily on Splunk for security monitoring, incident response, or operational intelligence are particularly at risk. The impact is heightened in sectors with strict confidentiality requirements, such as finance, healthcare, energy, and government. Since the vulnerability can be exploited remotely by authenticated users with low privileges, insider threats or compromised low-privilege accounts represent a significant risk vector.
Mitigation Recommendations
European organizations should immediately upgrade affected Splunk Enterprise instances to versions 10.0.2 or later, or the corresponding patched versions of 9.4.6, 9.3.8, and 9.2.10. Similarly, the Splunk Secure Gateway app should be updated to versions 3.9.10 or later. Until patches are applied, organizations should audit and restrict mobile push notification subscriptions, limiting them to trusted, high-privilege users only. Implement strict role-based access controls to minimize the number of users with notification subscriptions. Monitor Splunk logs for unusual subscription activity or unauthorized access attempts. Additionally, review and tighten internal policies regarding information disclosure through notifications. Employ network segmentation and multi-factor authentication to reduce the risk of account compromise. Regularly review Splunk user roles and permissions to ensure least privilege principles are enforced. Finally, educate users about the risks of unauthorized data exposure through notification channels.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-20383: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and below 3.9.10, 3.8.58, and 3.7.28 of Splunk Secure Gateway app in Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles and subscribes to mobile push notifications could receive notifications that disclose the title and description of the report or alert even if they do not have access to view the report or alert.
AI-Powered Analysis
Technical Analysis
CVE-2025-20383 is a vulnerability affecting multiple versions of Splunk Enterprise (below 10.0.2, 9.4.6, 9.3.8, and 9.2.10) and the Splunk Secure Gateway app (below 3.9.10, 3.8.58, and 3.7.28) used in the Splunk Cloud Platform. The flaw arises because low-privileged users who subscribe to mobile push notifications can receive notifications containing the title and description of reports or alerts, even if they lack explicit permissions to view those reports or alerts. This results in unauthorized disclosure of sensitive information, potentially revealing operational details or security-related alerts that should be restricted. The vulnerability does not allow modification or deletion of data, nor does it affect availability, but it compromises confidentiality. Exploitation requires the user to have a Splunk account with at least low privileges and to be subscribed to mobile push notifications, but no further user interaction is needed. The attack vector is network-based, and the vulnerability has a CVSS 3.1 score of 4.3, reflecting a medium severity level. No known exploits have been reported in the wild, but the exposure of sensitive alert metadata could aid attackers in planning further attacks or insider threat actors in gathering intelligence. The issue is resolved in later versions of Splunk Enterprise and the Secure Gateway app, so patching is the primary remediation.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive operational or security information leakage to unauthorized users within the organization or potentially compromised accounts. The exposure of alert titles and descriptions could reveal details about security incidents, system status, or business operations, which attackers could leverage for targeted attacks or social engineering. While it does not allow direct system compromise or data manipulation, the confidentiality breach can undermine trust and compliance with data protection regulations such as GDPR. Organizations relying heavily on Splunk for security monitoring, incident response, or operational intelligence are particularly at risk. The impact is heightened in sectors with strict confidentiality requirements, such as finance, healthcare, energy, and government. Since the vulnerability can be exploited remotely by authenticated users with low privileges, insider threats or compromised low-privilege accounts represent a significant risk vector.
Mitigation Recommendations
European organizations should immediately upgrade affected Splunk Enterprise instances to versions 10.0.2 or later, or the corresponding patched versions of 9.4.6, 9.3.8, and 9.2.10. Similarly, the Splunk Secure Gateway app should be updated to versions 3.9.10 or later. Until patches are applied, organizations should audit and restrict mobile push notification subscriptions, limiting them to trusted, high-privilege users only. Implement strict role-based access controls to minimize the number of users with notification subscriptions. Monitor Splunk logs for unusual subscription activity or unauthorized access attempts. Additionally, review and tighten internal policies regarding information disclosure through notifications. Employ network segmentation and multi-factor authentication to reduce the risk of account compromise. Regularly review Splunk user roles and permissions to ensure least privilege principles are enforced. Finally, educate users about the risks of unauthorized data exposure through notification channels.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.264Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69306fa787f844e8607995e2
Added to database: 12/3/2025, 5:13:11 PM
Last enriched: 12/3/2025, 5:31:18 PM
Last updated: 12/5/2025, 3:32:12 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12804: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevelop Booking Calendar
MediumCVE-2025-11759: CWE-352 Cross-Site Request Forgery (CSRF) in watchful Backup, Restore and Migrate your sites with XCloner
MediumCVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.