5.7

CVE-2025-20367

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorSplunk
Product Splunk Enterprise
Version < 10.0.0
Version 10.0
Status affected
Version < 9.4.4
Version 9.4
Status affected
Version < 9.3.6
Version 9.3
Status affected
Version < 9.2.8
Version 9.2
Status affected
VendorSplunk
Product Splunk Cloud Platform
Version < 9.3.2411.109
Version 9.3.2411
Status affected
Version < 9.3.2408.119
Version 9.3.2408
Status affected
Version < 9.2.2406.122
Version 9.2.2406
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.104
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@cisco.com 5.7 2.1 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.