Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise

0
Low
VulnerabilityCVE-2025-20385cvecve-2025-20385
Published: Wed Dec 03 2025 (12/03/2025, 17:00:29 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117, a user who holds a role with a high privilege capability `admin_all_objects` could craft a malicious payload through the href attribute of an anchor tag within a collection in the navigation bar, which could result in execution of unauthorized JavaScript code in the browser of a user.

AI-Powered Analysis

AILast updated: 12/03/2025, 17:30:51 UTC

Technical Analysis

CVE-2025-20385 is a stored cross-site scripting (XSS) vulnerability affecting Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, as well as Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117. The vulnerability arises because the software does not properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a user with the 'admin_all_objects' capability can craft a malicious payload by injecting JavaScript code into the href attribute of an anchor tag within a navigation bar collection. When other users view the affected navigation bar, the injected script executes in their browsers, potentially leading to unauthorized actions such as session hijacking or data theft. However, exploitation requires the attacker to have high privileges and the victim to interact with the malicious content, which reduces the attack surface. The CVSS 3.1 base score is 2.4, reflecting low severity due to the limited impact on confidentiality, integrity, and availability, and the need for user interaction and elevated privileges. No known exploits have been reported in the wild, and no patches are linked in the provided data, though vendors typically release updates to address such issues.

Potential Impact

For European organizations, the impact of CVE-2025-20385 is primarily related to potential unauthorized script execution in user browsers, which could lead to session hijacking, credential theft, or unauthorized actions within the Splunk interface. Given that exploitation requires a user with high privileges to inject the payload and other users to interact with it, the risk is mitigated by proper role management and user awareness. However, organizations with large Splunk deployments and multiple administrators could face internal threats if privileged accounts are compromised or misused. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or sensitive data environments monitored via Splunk, potentially undermining trust in monitoring data integrity. The low CVSS score indicates limited direct impact on system availability or integrity, but the confidentiality of user sessions and data could be at risk if exploited.

Mitigation Recommendations

European organizations should immediately verify their Splunk Enterprise and Cloud Platform versions and plan upgrades to the patched releases: 10.0.2, 9.4.6, 9.3.8, 9.2.10 for Enterprise and 10.1.2507.6, 10.0.2503.7, 9.3.2411.117 for Cloud. Until patches are applied, restrict the assignment of the 'admin_all_objects' role to only trusted personnel and enforce strict access controls and monitoring on privileged accounts. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Educate users to be cautious when interacting with navigation elements, especially if unexpected behavior is observed. Regularly audit Splunk configurations and navigation collections for unauthorized modifications. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the href attribute. Finally, monitor logs for unusual activity related to navigation bar changes or privilege escalations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69306fa787f844e8607995e8

Added to database: 12/3/2025, 5:13:11 PM

Last enriched: 12/3/2025, 5:30:51 PM

Last updated: 12/5/2025, 2:40:46 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats