Description
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- required
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- low
- Availability
- low
- Weaknesses
- CWE-776CWE-611
Metadata
- Primary Vendor
- SPLUNK
- Published
- 10/1/2025
- Last Modified
- 10/8/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
splunk : splunksplunk : splunksplunk : splunksplunk : splunk_cloud_platformsplunk : splunk_cloud_platformsplunk : splunk_cloud_platform
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.