SB2025070910 - Multiple vulnerabilities in Splunk Enterprise
Published: July 9, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2025-20325)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the SHCConfig logging channel in Clustered Deployments. A remote user can gain unauthorized access to sensitive information on the system.
2) Improper access control (CVE-ID: CVE-2025-20324)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in System Source Types Configuration. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.
3) Cross-site request forgery (CVE-ID: CVE-2025-20322)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in Search Head Cluster. A remote attacker can trick the victim to visit a specially crafted web page and trigger a rolling restart.
4) Cross-site request forgery (CVE-ID: CVE-2025-20321)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in Splunk Search Head Cluster. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website and change membership state.
5) External Control of File Name or Path (CVE-ID: CVE-2025-20320)
The vulnerability allows a remote user to delete arbitrary files within the Splunk directory.
The vulnerability exists due to application allows an attacker to control path of the files to delete on "User Interface - Views" page. A remote user can send a specially crafted HTTP request and delete arbitrary files within the Splunk directory.
6) OS Command Injection (CVE-ID: CVE-2025-20319)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper input validation when handling scripted input files. A remote user with edit_scripted and list_inputs capability can execute arbitrary OS commands.
Remediation
Install update from vendor's website.
References
- https://advisory.splunk.com/advisories/SVD-2025-0709
- https://advisory.splunk.com/advisories/SVD-2025-0707
- https://advisory.splunk.com/advisories/SVD-2025-0705
- https://advisory.splunk.com/advisories/SVD-2025-0704
- https://advisory.splunk.com/advisories/SVD-2025-0703
- https://advisory.splunk.com/advisories/SVD-2025-0702