HomeSplunkCVE-2025-20371

CVE-2025-20371

HIGH
7.5CVSS
Published: 2025-10-01
Updated: 2025-10-08
AI Analysis

Description

In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-918

Metadata

Primary Vendor
SPLUNK
Published
10/1/2025
Last Modified
10/8/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

splunk : splunksplunk : splunksplunk : splunksplunk : splunksplunk : splunk_cloud_platformsplunk : splunk_cloud_platformsplunk : splunk_cloud_platform

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief