First published: Tue Jan 07 2025(Updated: )
In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the "admin" Splunk roles.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk App for SOAR | <=1.0.67 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22621 is considered a moderate severity vulnerability due to its potential for improper access control.
To fix CVE-2025-22621, remove the `admin_all_objects` capability from the `splunk_app_soar` role in versions 1.0.67 and lower.
CVE-2025-22621 affects all versions of Splunk App for SOAR up to and including 1.0.67.
The `admin_all_objects` capability grants extensive permissions that could lead to security risks if assigned to low-privileged users.
A temporary workaround for CVE-2025-22621 is to restrict the `splunk_app_soar` role by not assigning the `admin_all_objects` capability while planning to update.