HomeSplunkCVE-2026-20141

CVE-2026-20141

MEDIUM
4.3CVSS
Published: 2026-02-18
Updated: 2026-02-23
AI Analysis

Description

In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who does not hold the "admin" Splunk role could access the Splunk Monitoring Console App endpoints due to an improper access control. This could lead to a sensitive information disclosure.<br><br>The Monitoring Console app is a bundled app that comes with Splunk Enterprise. It is not available for download on SplunkBase, and is not installed on Splunk Cloud Platform instances. This vulnerability does not affect [Cloud Monitoring Console](https://help.splunk.com/en/splunk-cloud-platform/administer/admin-manual/10.2.2510/monitor-your-splunk-cloud-platform-deployment/introduction-to-the-cloud-monitoring-console).

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
low
Availability
none
Weaknesses
CWE-200

Metadata

Primary Vendor
SPLUNK
Published
2/18/2026
Last Modified
2/23/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

splunk : splunksplunk : splunksplunk : splunk

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-20141 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com