CVE-2026-20137: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
AI Analysis
Technical Summary
CVE-2026-20137 affects multiple versions of Splunk Enterprise and Splunk Cloud Platform prior to 10.2.0, 10.1.2507.0, and related versions. The vulnerability arises because low-privileged users, who do not have admin or power roles, can create Data Models containing injected SPL (Search Processing Language) queries within objects. By exploiting a path traversal vulnerability, these users can bypass the safeguards designed to prevent execution of risky SPL commands. This bypass allows unauthorized access to sensitive information that should be restricted. The attack vector is network-based, requiring the attacker to have low-level privileges and some user interaction to create or manipulate Data Models. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive data. The CVSS v3.1 score is 3.5 (low), reflecting the limited scope and complexity of exploitation. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed promptly. The root cause is insufficient validation and access control on Data Model creation and SPL command execution within those models, combined with a path traversal flaw that enables bypassing of SPL safeguards.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of sensitive data stored or processed within Splunk Enterprise and Splunk Cloud Platform. Since Splunk is widely used for security information and event management (SIEM), unauthorized access to sensitive logs or security data could lead to information leakage, aiding further attacks or compliance violations. Although the vulnerability requires authenticated low-privileged user access, insider threats or compromised user accounts could exploit it to escalate data access beyond intended permissions. The impact on integrity and availability is negligible, but confidentiality breaches could undermine trust in security monitoring and incident response capabilities. Organizations in sectors such as finance, critical infrastructure, government, and telecommunications, which rely heavily on Splunk for security analytics, are particularly at risk. Additionally, exposure of sensitive logs could violate GDPR and other data protection regulations, leading to legal and financial repercussions.
Mitigation Recommendations
European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 10.2.0 or later (or the corresponding patched versions) as recommended by Splunk. Until patches are applied, organizations should restrict Data Model creation and modification permissions to trusted administrators only, preventing low-privileged users from exploiting the vulnerability. Implement strict role-based access control (RBAC) policies to limit the assignment of roles capable of creating or editing Data Models. Monitor Splunk audit logs for unusual Data Model creation or modification activities indicative of exploitation attempts. Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of low-privileged account compromise. Regularly review and harden SPL command execution policies and validate inputs to Data Models to detect and block injection attempts. Finally, maintain up-to-date threat intelligence feeds and monitor for any emerging exploit activity related to this CVE.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2026-20137: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2026-20137 affects multiple versions of Splunk Enterprise and Splunk Cloud Platform prior to 10.2.0, 10.1.2507.0, and related versions. The vulnerability arises because low-privileged users, who do not have admin or power roles, can create Data Models containing injected SPL (Search Processing Language) queries within objects. By exploiting a path traversal vulnerability, these users can bypass the safeguards designed to prevent execution of risky SPL commands. This bypass allows unauthorized access to sensitive information that should be restricted. The attack vector is network-based, requiring the attacker to have low-level privileges and some user interaction to create or manipulate Data Models. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive data. The CVSS v3.1 score is 3.5 (low), reflecting the limited scope and complexity of exploitation. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed promptly. The root cause is insufficient validation and access control on Data Model creation and SPL command execution within those models, combined with a path traversal flaw that enables bypassing of SPL safeguards.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of sensitive data stored or processed within Splunk Enterprise and Splunk Cloud Platform. Since Splunk is widely used for security information and event management (SIEM), unauthorized access to sensitive logs or security data could lead to information leakage, aiding further attacks or compliance violations. Although the vulnerability requires authenticated low-privileged user access, insider threats or compromised user accounts could exploit it to escalate data access beyond intended permissions. The impact on integrity and availability is negligible, but confidentiality breaches could undermine trust in security monitoring and incident response capabilities. Organizations in sectors such as finance, critical infrastructure, government, and telecommunications, which rely heavily on Splunk for security analytics, are particularly at risk. Additionally, exposure of sensitive logs could violate GDPR and other data protection regulations, leading to legal and financial repercussions.
Mitigation Recommendations
European organizations should immediately upgrade affected Splunk Enterprise and Splunk Cloud Platform instances to versions 10.2.0 or later (or the corresponding patched versions) as recommended by Splunk. Until patches are applied, organizations should restrict Data Model creation and modification permissions to trusted administrators only, preventing low-privileged users from exploiting the vulnerability. Implement strict role-based access control (RBAC) policies to limit the assignment of roles capable of creating or editing Data Models. Monitor Splunk audit logs for unusual Data Model creation or modification activities indicative of exploitation attempts. Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of low-privileged account compromise. Regularly review and harden SPL command execution policies and validate inputs to Data Models to detect and block injection attempts. Finally, maintain up-to-date threat intelligence feeds and monitor for any emerging exploit activity related to this CVE.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.381Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6996fb498fb9188dea8c09b8
Added to database: 2/19/2026, 12:00:09 PM
Last enriched: 2/19/2026, 12:07:32 PM
Last updated: 2/21/2026, 12:19:42 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.