CVE-2025-20231
Sensitive Information Disclosure in Splunk Secure Gateway App
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the βadminβ or βpowerβ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
| CWE | CWE-532 |
| Vendor | splunk |
| Product | splunk enterprise |
| Published | Mar 26, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for splunk splunk enterprise
Be the first to know when new high vulnerabilities affecting splunk splunk enterprise are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Splunk / Splunk Enterprise
9.4 < 9.4.1 9.3 < 9.3.3 9.2 < 9.2.5 9.1 < 9.1.8
Splunk / Splunk Secure Gateway
3.8 < 3.8.38 3.7 < 3.7.23
References
Credits
Anton (therceman)