First published: Wed Mar 26 2025(Updated: )
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could edit and delete other user data in App Key Value Store (KVStore) collections that the Splunk Secure Gateway app created. This is due to missing access control and incorrect ownership of the data in those KVStore collections.<br><br>In the affected versions, the `nobody` user owned the data in the KVStore collections. This meant that there was no specific owner assigned to the data in those collections.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Enterprise | <9.4.1 | |
Splunk Enterprise | <9.3.3 | |
Splunk Enterprise | <9.2.5 | |
Splunk Enterprise | <9.1.8 | |
Splunk Secure Gateway | <3.8.38 | |
Splunk Secure Gateway | <3.7.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20230 is classified as a moderate severity vulnerability.
To fix CVE-2025-20230, upgrade to Splunk Enterprise version 9.4.1 or later, or the latest versions of the Splunk Secure Gateway app.
Users of Splunk Enterprise versions below 9.4.1 and those using outdated Splunk Secure Gateway app versions are affected by CVE-2025-20230.
CVE-2025-20230 allows low-privileged users to edit and delete data belonging to other users.
There are no known workarounds for CVE-2025-20230; upgrading to the secure versions is the recommended approach.