CVE-2026-20162: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, and Splunk Cloud Platform versions below 10.2.2510.4, 10.1.2507.15, 10.0.2503.11, and 9.3.2411.123, a low-privileged user who does not hold the "admin" or "power" Splunk roles could craft a malicious payload when creating a View (Settings - User Interface - Views) at the `/manager/launcher/data/ui/views/_new` endpoint leading to a Stored Cross-Site Scripting (XSS) through a path traversal vulnerability. This could result in execution of unauthorized JavaScript code in the browser of a user. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
AI Analysis
Technical Summary
CVE-2026-20162 is a stored cross-site scripting (XSS) vulnerability affecting multiple versions of Splunk Enterprise and Splunk Cloud Platform prior to specified patch levels (below 10.2.0, 10.0.3, 9.4.9, and 9.3.9 for Enterprise). The vulnerability arises because the software fails to properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a low-privileged user lacking admin or power roles can exploit a path traversal vulnerability in the Views creation endpoint (/manager/launcher/data/ui/views/_new) to inject malicious JavaScript payloads. When another authenticated user views the compromised page, the injected script executes in their browser context, potentially exposing sensitive information such as session cookies or enabling actions on behalf of the victim user. Exploitation requires the attacker to phish the victim to initiate a request, as the vulnerability cannot be triggered arbitrarily by the attacker alone. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS 3.1 score of 6.3 reflects a network attack vector, low attack complexity, low privileges required, required user interaction, and high confidentiality impact but limited integrity and no availability impact. No public exploits have been reported yet. The vulnerability affects a broad range of Splunk Enterprise versions widely used in enterprise security monitoring, log management, and operational intelligence. The flaw underscores the importance of input validation and output encoding in web applications, especially those handling user-generated content. Since the vulnerability involves stored XSS, it can persist and affect multiple users until remediated. Splunk has not provided patch links in the provided data, but upgrading to fixed versions is recommended. Organizations should also review role assignments to limit low-privileged users' ability to create or modify Views and enhance phishing awareness to reduce the risk of victim interaction.
Potential Impact
The primary impact of CVE-2026-20162 is on confidentiality, as successful exploitation allows execution of arbitrary JavaScript in the browsers of authenticated users, potentially exposing session tokens, credentials, or sensitive information accessible in the user's session. This can lead to account compromise or unauthorized actions performed with the victim's privileges. The integrity impact is limited since the vulnerability does not allow direct modification of backend data or system configurations. Availability is not affected. The requirement for user interaction (phishing) and low privileges needed to craft the payload lower the overall risk but do not eliminate it, especially in environments with many users and complex role assignments. Organizations relying on Splunk Enterprise for security monitoring and incident response may face increased risk of lateral movement or data leakage if attackers exploit this vulnerability. The persistence of stored XSS means multiple users can be affected until the vulnerability is patched. Given Splunk's widespread use in critical infrastructure, finance, healthcare, and government sectors, the potential impact spans multiple industries and geographies. Attackers could leverage this vulnerability as part of a broader attack chain to gain footholds or exfiltrate data.
Mitigation Recommendations
1. Upgrade affected Splunk Enterprise and Cloud Platform instances to the latest patched versions (at or above 10.2.0, 10.0.3, 9.4.9, and 9.3.9 for Enterprise). 2. Restrict the ability to create or modify Views to trusted, higher-privileged roles only, minimizing exposure to low-privileged users. 3. Implement strict input validation and output encoding in custom Views or dashboards to prevent injection of malicious scripts. 4. Conduct regular audits of user roles and permissions to ensure least privilege principles are enforced. 5. Enhance phishing awareness training for users to reduce the likelihood of victims triggering malicious payloads. 6. Monitor Splunk logs for unusual activity related to Views creation or modification endpoints. 7. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing Splunk interfaces. 8. Use multi-factor authentication (MFA) to reduce risk of account compromise if session tokens are exposed. 9. Isolate Splunk management interfaces from general user networks where feasible to limit exposure. 10. Stay informed of vendor advisories and apply security patches promptly.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, Japan, South Korea, France, Netherlands, Singapore
CVE-2026-20162: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, and Splunk Cloud Platform versions below 10.2.2510.4, 10.1.2507.15, 10.0.2503.11, and 9.3.2411.123, a low-privileged user who does not hold the "admin" or "power" Splunk roles could craft a malicious payload when creating a View (Settings - User Interface - Views) at the `/manager/launcher/data/ui/views/_new` endpoint leading to a Stored Cross-Site Scripting (XSS) through a path traversal vulnerability. This could result in execution of unauthorized JavaScript code in the browser of a user. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20162 is a stored cross-site scripting (XSS) vulnerability affecting multiple versions of Splunk Enterprise and Splunk Cloud Platform prior to specified patch levels (below 10.2.0, 10.0.3, 9.4.9, and 9.3.9 for Enterprise). The vulnerability arises because the software fails to properly neutralize user-controllable input before embedding it into web pages served to other users. Specifically, a low-privileged user lacking admin or power roles can exploit a path traversal vulnerability in the Views creation endpoint (/manager/launcher/data/ui/views/_new) to inject malicious JavaScript payloads. When another authenticated user views the compromised page, the injected script executes in their browser context, potentially exposing sensitive information such as session cookies or enabling actions on behalf of the victim user. Exploitation requires the attacker to phish the victim to initiate a request, as the vulnerability cannot be triggered arbitrarily by the attacker alone. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS 3.1 score of 6.3 reflects a network attack vector, low attack complexity, low privileges required, required user interaction, and high confidentiality impact but limited integrity and no availability impact. No public exploits have been reported yet. The vulnerability affects a broad range of Splunk Enterprise versions widely used in enterprise security monitoring, log management, and operational intelligence. The flaw underscores the importance of input validation and output encoding in web applications, especially those handling user-generated content. Since the vulnerability involves stored XSS, it can persist and affect multiple users until remediated. Splunk has not provided patch links in the provided data, but upgrading to fixed versions is recommended. Organizations should also review role assignments to limit low-privileged users' ability to create or modify Views and enhance phishing awareness to reduce the risk of victim interaction.
Potential Impact
The primary impact of CVE-2026-20162 is on confidentiality, as successful exploitation allows execution of arbitrary JavaScript in the browsers of authenticated users, potentially exposing session tokens, credentials, or sensitive information accessible in the user's session. This can lead to account compromise or unauthorized actions performed with the victim's privileges. The integrity impact is limited since the vulnerability does not allow direct modification of backend data or system configurations. Availability is not affected. The requirement for user interaction (phishing) and low privileges needed to craft the payload lower the overall risk but do not eliminate it, especially in environments with many users and complex role assignments. Organizations relying on Splunk Enterprise for security monitoring and incident response may face increased risk of lateral movement or data leakage if attackers exploit this vulnerability. The persistence of stored XSS means multiple users can be affected until the vulnerability is patched. Given Splunk's widespread use in critical infrastructure, finance, healthcare, and government sectors, the potential impact spans multiple industries and geographies. Attackers could leverage this vulnerability as part of a broader attack chain to gain footholds or exfiltrate data.
Mitigation Recommendations
1. Upgrade affected Splunk Enterprise and Cloud Platform instances to the latest patched versions (at or above 10.2.0, 10.0.3, 9.4.9, and 9.3.9 for Enterprise). 2. Restrict the ability to create or modify Views to trusted, higher-privileged roles only, minimizing exposure to low-privileged users. 3. Implement strict input validation and output encoding in custom Views or dashboards to prevent injection of malicious scripts. 4. Conduct regular audits of user roles and permissions to ensure least privilege principles are enforced. 5. Enhance phishing awareness training for users to reduce the likelihood of victims triggering malicious payloads. 6. Monitor Splunk logs for unusual activity related to Views creation or modification endpoints. 7. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing Splunk interfaces. 8. Use multi-factor authentication (MFA) to reduce risk of account compromise if session tokens are exposed. 9. Isolate Splunk management interfaces from general user networks where feasible to limit exposure. 10. Stay informed of vendor advisories and apply security patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.388Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b198902f860ef9433d35e3
Added to database: 3/11/2026, 4:30:08 PM
Last enriched: 3/18/2026, 7:09:22 PM
Last updated: 4/28/2026, 7:21:15 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.