CVE-2026-20137Sensitive Information Exposure in Cloud Platform

Severity
5.7MEDIUMNVD
CNA3.5
EPSS
0.0%
top 89.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:NExploitability: 2.1 | Impact: 3.6

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform10.1.250710.1.2507.0+3
NVDsplunk/splunk_cloud_platform9.3.24089.3.2408.122+3
CVEListV5splunk/splunk_enterprise10.210.2.0+4
NVDsplunk/splunk9.2.09.2.9+3

🔴Vulnerability Details

2
GHSA
GHSA-4v8p-q39m-4pj8: In Splunk Enterprise versions below 102026-02-18
CVEList
Risky Commands Safeguards Bypass through preloaded Data Models due to Path Traversal vulnerability in Splunk Enterprise2026-02-18

🕵️Threat Intelligence

1
Wiz
CVE-2026-20137 Impact, Exploitability, and Mitigation Steps | Wiz