Description
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- high
- User Action
- required
- Scope
- changed
- Confidentiality
- high
- Integrity
- high
- Availability
- none
- Weaknesses
- CWE-79CWE-79
Metadata
- Primary Vendor
- SPLUNK
- Published
- 7/1/2024
- Last Modified
- 3/7/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
splunk : splunksplunk : splunksplunk : splunksplunk : splunk_cloud_platform
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.