SB2025070910 - Multiple vulnerabilities in Splunk Enterprise



SB2025070910 - Multiple vulnerabilities in Splunk Enterprise

Published: July 9, 2025

Security Bulletin ID SB2025070910
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2025-20325)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in the SHCConfig logging channel in Clustered Deployments. A remote user can gain unauthorized access to sensitive information on the system.


2) Improper access control (CVE-ID: CVE-2025-20324)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in System Source Types Configuration. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.


3) Cross-site request forgery (CVE-ID: CVE-2025-20322)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in Search Head Cluster. A remote attacker can trick the victim to visit a specially crafted web page and trigger a rolling restart.


4) Cross-site request forgery (CVE-ID: CVE-2025-20321)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in Splunk Search Head Cluster. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website and change membership state.


5) External Control of File Name or Path (CVE-ID: CVE-2025-20320)

The vulnerability allows a remote user to delete arbitrary files within the Splunk directory.

The vulnerability exists due to application allows an attacker to control path of the files to delete on "User Interface - Views" page. A remote user can send a specially crafted HTTP request and delete arbitrary files within the Splunk directory.


6) OS Command Injection (CVE-ID: CVE-2025-20319)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper input validation when handling scripted input files. A remote user with edit_scripted and list_inputs capability can execute arbitrary OS commands. 


Remediation

Install update from vendor's website.