5.7

CVE-2025-20368

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through the error messages and job inspection details of a saved search. This could result in execution of unauthorized JavaScript code in the browser of a user.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorSplunk
Product Splunk Enterprise
Version < 10.0.0
Version 10.0
Status affected
Version < 9.4.4
Version 9.4
Status affected
Version < 9.3.6
Version 9.3
Status affected
Version < 9.2.8
Version 9.2
Status affected
VendorSplunk
Product Splunk Cloud Platform
Version < 9.3.2411.108
Version 9.3.2411
Status affected
Version < 9.3.2408.118
Version 9.3.2408
Status affected
Version < 9.2.2406.123
Version 9.2.2406
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.104
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@cisco.com 5.7 2.1 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.