CVE-2025-20367

Severity
5.4MEDIUM
EPSS
0.0%
top 91.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:NExploitability: 2.1 | Impact: 3.6

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform9.3.24119.3.2411.109+2
NVDsplunk/splunk_cloud_platform9.2.24069.2.2406.122+2
CVEListV5splunk/splunk_enterprise10.010.0.0+3
NVDsplunk/splunk9.2.09.2.8+2

🔴Vulnerability Details

2
CVEList
Reflected Cross-site Scripting (XSS) in '/app/search/table' endpoint through the 'dataset.command' parameter on Splunk Enterprise2025-10-01
GHSA
GHSA-mr5p-hhp7-5qgx: In Splunk Enterprise versions below 92025-10-01
CVE-2025-20367 (MEDIUM CVSS 5.4) | In Splunk Enterprise versions below | cvebase.io