CVE-2026-20162Cross-site Scripting in Cloud Platform

Severity
6.3MEDIUMNVD
EPSS
0.0%
top 86.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11

Description

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, and Splunk Cloud Platform versions below 10.2.2510.4, 10.1.2507.15, 10.0.2503.11, and 9.3.2411.123, a low-privileged user who does not hold the "admin" or "power" Splunk roles could craft a malicious payload when creating a View (Settings - User Interface - Views) at the `/manager/launcher/data/ui/views/_new` endpoint leading to a Stored Cross-Site Scripting (XSS) through a path traversal vulnerability. This could result in ex

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:NExploitability: 2.1 | Impact: 4.2

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform10.2.251010.2.2510.4+3
NVDsplunk/splunk_cloud_platform9.3.24119.3.2411.123+3
CVEListV5splunk/splunk_enterprise10.010.0.3+2
NVDsplunk/splunk9.3.09.3.9+2

🔴Vulnerability Details

2
GHSA
GHSA-3c9f-25h4-p2q8: In Splunk Enterprise versions below 102026-03-11
CVEList
Stored Cross-Site Scripting (XSS) through Path Traversal in Splunk Enterprise2026-03-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20162 Impact, Exploitability, and Mitigation Steps | Wiz