First published: Wed Mar 26 2025(Updated: )
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Enterprise | <9.4.1 | |
Splunk Enterprise | <9.3.3 | |
Splunk Enterprise | <9.2.5 | |
Splunk Enterprise | <9.1.8 | |
Splunk Secure Gateway | <3.8.38 | |
Splunk Secure Gateway | <3.7.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-20231 is assessed as low, indicating that it poses a limited risk to systems.
To fix CVE-2025-20231, update to Splunk Enterprise version 9.4.1 or higher, or install the latest version of the Splunk Secure Gateway app.
CVE-2025-20231 affects users of Splunk Enterprise versions below 9.4.1 and specific versions of the Splunk Secure Gateway app.
A low-privileged user can run searches with elevated permissions, which can lead to unauthorized data access.
Currently, no specific workarounds have been recommended for CVE-2025-20231 outside of upgrading the affected software.