Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to execute unauthorized JavaScript code, access sensitive information, or cause a denial-of-service (DoS) condition.
The advisories, published on October 1, 2025, detail six security flaws, with severity ratings ranging from Medium to High.
The most critical vulnerability is a Server-Side Request Forgery (SSRF) flaw, tracked as CVE-2025-20371, with a high CVSS score of 7.5.
This vulnerability could allow an unauthenticated attacker to trigger a blind SSRF, potentially enabling them to perform REST API calls on behalf of an authenticated, high-privileged user.
Successful exploitation requires the enableSplunkWebClientNetloc setting to be enabled and likely involves phishing the victim to initiate a request from their browser.
Code Execution and Information Disclosure Flaws
Two vulnerabilities directly address the execution of unauthorized JavaScript code, a form of cross-site scripting (XSS).
- CVE-2025-20367 (CVSS: 5.7): A low-privileged user can craft a malicious payload through the dataset.command parameter of a specific endpoint, leading to the execution of JavaScript code in a user’s browser.
- CVE-2025-20368 (CVSS: 5.7): Similarly, a low-privileged user can inject a malicious payload into the error messages and job inspection details of a saved search, resulting in unauthorized code execution.
Another significant flaw, CVE-2025-20366 (CVSS: 6.5), allows for information disclosure. In this scenario, a low-privileged user without ‘admin’ or ‘power’ roles could access the results of an administrative search job running in the background.
If the attacker correctly guesses the unique Search ID (SID) of the job, they could retrieve potentially sensitive search results.
Denial of Service and XXE Vulnerabilities
The security update also addresses three medium-severity vulnerabilities that could impact system availability and integrity:
- CVE-2025-20370 (CVSS: 4.9): A user with the change_authentication capability can send multiple LDAP bind requests to an internal endpoint, causing high CPU usage and a potential DoS that requires an instance restart to resolve.
- CVE-2025-20369 (CVSS: 4.6): A low-privileged user can perform an XML External Entity (XXE) injection through the dashboard tab label field, which could also lead to a DoS attack.
Affected Products and Mitigations
The vulnerabilities affect multiple versions of Splunk Enterprise and Splunk Cloud Platform. The affected Splunk Enterprise versions include those below 9.4.4, 9.3.6, and 9.2.8. For some flaws, version 10.0.0 is also affected.
Splunk has released patches and urges customers to upgrade to the following or later versions:
CVE IDVulnerability TypeCVSS 3.1 ScoreAffected ProductAffected VersionsFixed VersionsCVE-2025-20366Information Disclosure6.5 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.111 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.111 9.3.2408.119 9.2.2406.122CVE-2025-20367Cross-Site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122CVE-2025-20368Cross-Site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20369XXE Injection4.6 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20370Denial of Service (DoS)4.9 (Medium)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20371Server-Side Request Forgery (SSRF)7.5 (High)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122
Splunk has confirmed it is actively patching all Splunk Cloud Platform instances and will notify customers upon completion.
For users unable to apply the updates immediately, several workarounds are available. A common mitigation for many of the vulnerabilities is to disable Splunk Web if it is not required.
For the SSRF flaw (CVE-2025-20371), administrators can mitigate the risk by setting enableSplunkWebClientNetloc to false in the web.conf file.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
Source: cybersecuritynews.com