HomeSplunkCVE-2025-20369

CVE-2025-20369

MEDIUM
4.6CVSS
Published: 2025-10-01
Updated: 2025-10-08
AI Analysis

Description

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
low
Availability
low
Weaknesses
CWE-776CWE-611

Metadata

Primary Vendor
SPLUNK
Published
10/1/2025
Last Modified
10/8/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

splunk : splunksplunk : splunksplunk : splunksplunk : splunk_cloud_platformsplunk : splunk_cloud_platformsplunk : splunk_cloud_platform

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief