Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise

0
Low
VulnerabilityCVE-2025-20385cvecve-2025-20385
Published: Wed Dec 03 2025 (12/03/2025, 17:00:29 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117, a user who holds a role with a high privilege capability `admin_all_objects` could craft a malicious payload through the href attribute of an anchor tag within a collection in the navigation bar, which could result in execution of unauthorized JavaScript code in the browser of a user.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:34:54 UTC

Technical Analysis

CVE-2025-20385 is a stored cross-site scripting (XSS) vulnerability affecting Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, as well as Splunk Cloud Platform versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117. The vulnerability arises because the software does not properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a user with the 'admin_all_objects' capability can craft a malicious payload within the href attribute of an anchor tag in a navigation bar collection. When other users view the affected page, the malicious JavaScript executes in their browsers, potentially leading to session hijacking, credential theft, or other client-side attacks. However, exploitation requires the attacker to have high privileges and necessitates user interaction to trigger the payload. The CVSS v3.1 base score is 2.4, reflecting low severity due to limited impact on confidentiality and no impact on integrity or availability. No known active exploits have been reported. The vulnerability underscores the importance of input validation and output encoding in web applications, especially those handling sensitive operational data like Splunk. Vendors have released patches in the specified versions to address this issue.

Potential Impact

For European organizations, the primary impact is the potential for unauthorized JavaScript execution in the browsers of users who access the compromised navigation bar collections. This could lead to limited confidentiality breaches such as session token theft or unauthorized actions performed in the context of the victim user. However, since exploitation requires an attacker to already have high-level administrative privileges and user interaction, the risk of widespread compromise is low. Organizations relying on Splunk for security monitoring and operational intelligence could face targeted attacks aimed at elevating privileges or stealing sensitive monitoring data if the vulnerability is exploited. The impact on integrity and availability is negligible. Nonetheless, in environments with strict compliance requirements (e.g., GDPR), even low-severity vulnerabilities that could lead to data leakage must be addressed promptly. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

1. Apply the vendor-provided patches by upgrading Splunk Enterprise to version 10.0.2 or later, 9.4.6 or later, 9.3.8 or later, and 9.2.10 or later, or the corresponding patched versions of Splunk Cloud Platform. 2. Restrict the assignment of the 'admin_all_objects' capability strictly to trusted and necessary personnel to reduce the attack surface. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Splunk web interfaces. 4. Regularly audit Splunk navigation bar collections and other user-controllable inputs for suspicious or unauthorized modifications. 5. Educate users with high privileges about phishing and social engineering risks to prevent attackers from gaining initial access. 6. Monitor Splunk logs for unusual activity related to navigation bar modifications or administrative actions. 7. Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting Splunk interfaces. These steps go beyond generic advice by focusing on privilege management, input auditing, and layered defenses specific to the Splunk environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69306fa787f844e8607995e8

Added to database: 12/3/2025, 5:13:11 PM

Last enriched: 12/10/2025, 6:34:54 PM

Last updated: 1/18/2026, 6:03:40 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats