CVE-2025-20384: The software does not neutralize or incorrectly neutralizes output that is written to logs. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.
AI Analysis
Technical Summary
CVE-2025-20384 is a vulnerability identified in Splunk Enterprise versions prior to 10.0.1, 9.4.6, 9.3.8, and 9.2.10, as well as corresponding versions of Splunk Cloud Platform. The root cause is the failure to properly neutralize or sanitize output written to log files, specifically allowing injection of ANSI escape codes through the /en-US/static/ web endpoint. ANSI escape codes can manipulate terminal output, enabling attackers to alter how log entries are displayed or interpreted. An unauthenticated attacker can craft HTTP requests containing these escape codes, which get logged by Splunk without adequate sanitization. This results in log poisoning, where log entries can be forged or obfuscated, potentially misleading security analysts or automated detection systems. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of log data, a critical component for security monitoring and incident response. The CVSS 3.1 base score is 5.3, reflecting network attack vector, low complexity, no privileges required, no user interaction, and impact limited to integrity. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on Splunk for trustworthy log data. The issue was reserved in October 2024 and published in December 2025, with no patch links provided in the data but fixed versions indicated.
Potential Impact
For European organizations, this vulnerability threatens the integrity of security logs, which are essential for detecting malicious activity, conducting forensic investigations, and maintaining compliance with regulations such as GDPR and NIS Directive. Log poisoning can cause false negatives or false positives in security monitoring, delaying or preventing detection of real attacks. Critical sectors like finance, energy, telecommunications, and government that rely heavily on Splunk for centralized log management and security analytics are particularly vulnerable. The inability to trust log data can undermine incident response and risk management processes, potentially leading to prolonged breaches or regulatory penalties. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad, increasing the likelihood of opportunistic attacks. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but should not be underestimated in high-risk environments.
Mitigation Recommendations
Organizations should prioritize upgrading Splunk Enterprise and Splunk Cloud Platform to versions 10.0.1 or later, 9.4.6 or later, 9.3.8 or later, and 9.2.10 or later as applicable. Until upgrades are applied, implement strict web application firewall (WAF) rules to detect and block HTTP requests containing suspicious ANSI escape sequences targeting the /en-US/static/ endpoint. Enhance log monitoring to identify anomalies indicative of log poisoning, such as unexpected control characters or formatting irregularities. Review and harden input validation and output encoding mechanisms in custom Splunk apps or integrations that interact with user-supplied data. Conduct regular audits of log integrity using cryptographic methods or third-party tools to detect tampering. Train security analysts to recognize signs of log manipulation and incorporate this threat into incident response playbooks. Coordinate with Splunk support and monitor vendor advisories for patches and updates. Consider network segmentation and limiting exposure of Splunk management interfaces to reduce attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-20384: The software does not neutralize or incorrectly neutralizes output that is written to logs. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.
AI-Powered Analysis
Technical Analysis
CVE-2025-20384 is a vulnerability identified in Splunk Enterprise versions prior to 10.0.1, 9.4.6, 9.3.8, and 9.2.10, as well as corresponding versions of Splunk Cloud Platform. The root cause is the failure to properly neutralize or sanitize output written to log files, specifically allowing injection of ANSI escape codes through the /en-US/static/ web endpoint. ANSI escape codes can manipulate terminal output, enabling attackers to alter how log entries are displayed or interpreted. An unauthenticated attacker can craft HTTP requests containing these escape codes, which get logged by Splunk without adequate sanitization. This results in log poisoning, where log entries can be forged or obfuscated, potentially misleading security analysts or automated detection systems. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of log data, a critical component for security monitoring and incident response. The CVSS 3.1 base score is 5.3, reflecting network attack vector, low complexity, no privileges required, no user interaction, and impact limited to integrity. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on Splunk for trustworthy log data. The issue was reserved in October 2024 and published in December 2025, with no patch links provided in the data but fixed versions indicated.
Potential Impact
For European organizations, this vulnerability threatens the integrity of security logs, which are essential for detecting malicious activity, conducting forensic investigations, and maintaining compliance with regulations such as GDPR and NIS Directive. Log poisoning can cause false negatives or false positives in security monitoring, delaying or preventing detection of real attacks. Critical sectors like finance, energy, telecommunications, and government that rely heavily on Splunk for centralized log management and security analytics are particularly vulnerable. The inability to trust log data can undermine incident response and risk management processes, potentially leading to prolonged breaches or regulatory penalties. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad, increasing the likelihood of opportunistic attacks. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but should not be underestimated in high-risk environments.
Mitigation Recommendations
Organizations should prioritize upgrading Splunk Enterprise and Splunk Cloud Platform to versions 10.0.1 or later, 9.4.6 or later, 9.3.8 or later, and 9.2.10 or later as applicable. Until upgrades are applied, implement strict web application firewall (WAF) rules to detect and block HTTP requests containing suspicious ANSI escape sequences targeting the /en-US/static/ endpoint. Enhance log monitoring to identify anomalies indicative of log poisoning, such as unexpected control characters or formatting irregularities. Review and harden input validation and output encoding mechanisms in custom Splunk apps or integrations that interact with user-supplied data. Conduct regular audits of log integrity using cryptographic methods or third-party tools to detect tampering. Train security analysts to recognize signs of log manipulation and incorporate this threat into incident response playbooks. Coordinate with Splunk support and monitor vendor advisories for patches and updates. Consider network segmentation and limiting exposure of Splunk management interfaces to reduce attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.264Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69306fa787f844e8607995e5
Added to database: 12/3/2025, 5:13:11 PM
Last enriched: 12/10/2025, 6:33:50 PM
Last updated: 1/19/2026, 7:55:48 AM
Views: 143
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.