Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20137: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise

0
Low
VulnerabilityCVE-2026-20137cvecve-2026-20137
Published: Wed Feb 18 2026 (02/18/2026, 16:45:17 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:07:32 UTC

Technical Analysis

CVE-2026-20137 affects multiple versions of Splunk Enterprise and Splunk Cloud Platform prior to 10.2.0, 10.1.2507.0, and related versions. The vulnerability arises because low-privileged users, who do not have admin or power roles, can create Data Models containing injected SPL (Search Processing Language) queries within objects. By exploiting a path traversal vulnerability, these users can bypass the safeguards designed to prevent execution of risky SPL commands. This bypass allows unauthorized access to sensitive information that should be restricted. The attack vector is network-based, requiring the attacker to have low-level privileges and some user interaction to create or manipulate Data Models. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive data. The CVSS v3.1 score is 3.5 (low), reflecting the limited scope and complexity of exploitation. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed promptly. The root cause is insufficient validation and access control on Data Model creation and SPL command execution within those models, combined with a path traversal flaw that enables bypassing of SPL safeguards.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of sensitive data stored or processed within Splunk Enterprise and Splunk Cloud Platform. Since Splunk is widely used for security information and event management (SIEM), unauthorized access to sensitive logs or security data could lead to information leakage, aiding further attacks or compliance violations. Although the vulnerability requires authenticated low-privileged user access, insider threats or compromised user accounts could exploit it to escalate data access beyond intended permissions. The impact on integrity and availability is negligible, but confidentiality breaches could undermine trust in security monitoring and incident response capabilities. Organizations in sectors such as finance, critical infrastructure, government, and telecommunications, which rely heavily on Splunk for security analytics, are particularly at risk. Additionally, exposure of sensitive logs could violate GDPR and other data protection regulations, leading to legal and financial repercussions.

Mitigation Recommendations

European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 10.2.0 or later (or the corresponding patched versions) as recommended by Splunk. Until patches are applied, organizations should restrict Data Model creation and modification permissions to trusted administrators only, preventing low-privileged users from exploiting the vulnerability. Implement strict role-based access control (RBAC) policies to limit the assignment of roles capable of creating or editing Data Models. Monitor Splunk audit logs for unusual Data Model creation or modification activities indicative of exploitation attempts. Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of low-privileged account compromise. Regularly review and harden SPL command execution policies and validate inputs to Data Models to detect and block injection attempts. Finally, maintain up-to-date threat intelligence feeds and monitor for any emerging exploit activity related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb498fb9188dea8c09b8

Added to database: 2/19/2026, 12:00:09 PM

Last enriched: 2/19/2026, 12:07:32 PM

Last updated: 2/21/2026, 12:19:42 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats