CVE-2025-20320

Severity
7.3HIGH
EPSS
0.1%
top 72.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 7

Description

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through the `User Interface - Views` configuration page that could potentially lead to a denial of service (DoS).The user could cause the DoS by exploiting a path traversal vulnerability that allows for deletion of arbitrary files withi

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:HExploitability: 2.1 | Impact: 4.2

Affected Packages4 packages

NVDsplunk/splunk_cloud_platform9.2.24069.2.2406.121+2
CVEListV5splunk/splunk_enterprise_cloud9.3.24119.3.2411.107+2
CVEListV5splunk/splunk_enterprise9.49.4.3+3
NVDsplunk/splunk9.1.09.1.10+3

🔴Vulnerability Details

2
CVEList
Denial of Service (DoS) through “User Interface - Views“ configuration page in Splunk Enterprise2025-07-07
GHSA
GHSA-f5m7-22fg-43fw: In Splunk Enterprise versions below 92025-07-07

📋Vendor Advisories

1
Microsoft
A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw a local attacker with special user privilege can circumvent the verifier and may lea2022-02-08