CVE-2025-20228Cross-Site Request Forgery in Cloud Platform

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 75.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26
Latest updateMar 27

Description

In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform9.2.24039.2.2403.108+1
NVDsplunk/splunk_cloud_platform9.1.23129.1.2312.204+1
CVEListV5splunk/splunk_enterprise9.39.3.3+2
NVDsplunk/splunk9.1.09.1.8+2

🔴Vulnerability Details

2
GHSA
GHSA-4gcx-7vhp-wj94: In Splunk Enterprise versions below 92025-03-27
CVEList
Maintenance mode state change of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF) in Splunk Enterprise2025-03-26
CVE-2025-20228 — Cross-Site Request Forgery in Splunk | cvebase