CVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117, a user who holds a role with a high privilege capability `admin_all_objects` could craft a malicious payload through the href attribute of an anchor tag within a collection in the navigation bar, which could result in execution of unauthorized JavaScript code in the browser of a user.
AI Analysis
Technical Summary
CVE-2025-20385 is a stored cross-site scripting (XSS) vulnerability affecting Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, as well as Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117. The vulnerability arises because the software does not properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a user with the 'admin_all_objects' capability can craft a malicious payload within the href attribute of an anchor tag in a navigation bar collection. When other users view the affected page, the malicious JavaScript executes in their browsers, potentially leading to session hijacking, credential theft, or other client-side attacks. However, exploitation requires the attacker to have high privileges and necessitates user interaction to trigger the payload. The CVSS v3.1 base score is 2.4, reflecting low severity due to limited impact on confidentiality and no impact on integrity or availability. No known active exploits have been reported. The vulnerability underscores the importance of input validation and output encoding in web applications, especially those handling sensitive operational data like Splunk. Vendors have released patches in the specified versions to address this issue.
Potential Impact
For European organizations, the primary impact is the potential for unauthorized JavaScript execution in the browsers of users who access the compromised navigation bar collections. This could lead to limited confidentiality breaches such as session token theft or unauthorized actions performed in the context of the victim user. However, since exploitation requires an attacker to already have high-level administrative privileges and user interaction, the risk of widespread compromise is low. Organizations relying on Splunk for security monitoring and operational intelligence could face targeted attacks aimed at elevating privileges or stealing sensitive monitoring data if the vulnerability is exploited. The impact on integrity and availability is negligible. Nonetheless, in environments with strict compliance requirements (e.g., GDPR), even low-severity vulnerabilities that could lead to data leakage must be addressed promptly. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
1. Apply the vendor-provided patches by upgrading Splunk Enterprise to version 10.0.2 or later, 9.4.6 or later, 9.3.8 or later, and 9.2.10 or later, or the corresponding patched versions of Splunk Cloud Platform. 2. Restrict the assignment of the 'admin_all_objects' capability strictly to trusted and necessary personnel to reduce the attack surface. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Splunk web interfaces. 4. Regularly audit Splunk navigation bar collections and other user-controllable inputs for suspicious or unauthorized modifications. 5. Educate users with high privileges about phishing and social engineering risks to prevent attackers from gaining initial access. 6. Monitor Splunk logs for unusual activity related to navigation bar modifications or administrative actions. 7. Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting Splunk interfaces. These steps go beyond generic advice by focusing on privilege management, input auditing, and layered defenses specific to the Splunk environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117, a user who holds a role with a high privilege capability `admin_all_objects` could craft a malicious payload through the href attribute of an anchor tag within a collection in the navigation bar, which could result in execution of unauthorized JavaScript code in the browser of a user.
AI-Powered Analysis
Technical Analysis
CVE-2025-20385 is a stored cross-site scripting (XSS) vulnerability affecting Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, as well as Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117. The vulnerability arises because the software does not properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a user with the 'admin_all_objects' capability can craft a malicious payload within the href attribute of an anchor tag in a navigation bar collection. When other users view the affected page, the malicious JavaScript executes in their browsers, potentially leading to session hijacking, credential theft, or other client-side attacks. However, exploitation requires the attacker to have high privileges and necessitates user interaction to trigger the payload. The CVSS v3.1 base score is 2.4, reflecting low severity due to limited impact on confidentiality and no impact on integrity or availability. No known active exploits have been reported. The vulnerability underscores the importance of input validation and output encoding in web applications, especially those handling sensitive operational data like Splunk. Vendors have released patches in the specified versions to address this issue.
Potential Impact
For European organizations, the primary impact is the potential for unauthorized JavaScript execution in the browsers of users who access the compromised navigation bar collections. This could lead to limited confidentiality breaches such as session token theft or unauthorized actions performed in the context of the victim user. However, since exploitation requires an attacker to already have high-level administrative privileges and user interaction, the risk of widespread compromise is low. Organizations relying on Splunk for security monitoring and operational intelligence could face targeted attacks aimed at elevating privileges or stealing sensitive monitoring data if the vulnerability is exploited. The impact on integrity and availability is negligible. Nonetheless, in environments with strict compliance requirements (e.g., GDPR), even low-severity vulnerabilities that could lead to data leakage must be addressed promptly. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
1. Apply the vendor-provided patches by upgrading Splunk Enterprise to version 10.0.2 or later, 9.4.6 or later, 9.3.8 or later, and 9.2.10 or later, or the corresponding patched versions of Splunk Cloud Platform. 2. Restrict the assignment of the 'admin_all_objects' capability strictly to trusted and necessary personnel to reduce the attack surface. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Splunk web interfaces. 4. Regularly audit Splunk navigation bar collections and other user-controllable inputs for suspicious or unauthorized modifications. 5. Educate users with high privileges about phishing and social engineering risks to prevent attackers from gaining initial access. 6. Monitor Splunk logs for unusual activity related to navigation bar modifications or administrative actions. 7. Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting Splunk interfaces. These steps go beyond generic advice by focusing on privilege management, input auditing, and layered defenses specific to the Splunk environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69306fa787f844e8607995e8
Added to database: 12/3/2025, 5:13:11 PM
Last enriched: 12/10/2025, 6:34:54 PM
Last updated: 1/18/2026, 6:03:40 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.