πŸ” CVE Alert

CVE-2025-20231

HIGH 7.1

Sensitive Information Disclosure in Splunk Secure Gateway App

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the β€œadminβ€œ or β€œpowerβ€œ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.

CWE CWE-532
Vendor splunk
Product splunk enterprise
Published Mar 26, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for splunk splunk enterprise

Be the first to know when new high vulnerabilities affecting splunk splunk enterprise are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Splunk / Splunk Enterprise
9.4 < 9.4.1 9.3 < 9.3.3 9.2 < 9.2.5 9.1 < 9.1.8
Splunk / Splunk Secure Gateway
3.8 < 3.8.38 3.7 < 3.7.23

References

NVD β†— CVE.org β†— EPSS Data β†—
advisory.splunk.com: https://advisory.splunk.com/advisories/SVD-2025-0302

Credits

Anton (therceman)