CVE-2026-20137
Risky Commands Safeguards Bypass through preloaded Data Models due to Path Traversal vulnerability in Splunk Enterprise
CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
0th
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
| CWE | CWE-200 |
| Vendor | splunk |
| Product | splunk enterprise |
| Published | Feb 18, 2026 |
| Last Updated | Feb 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for splunk splunk enterprise
Be the first to know when new low vulnerabilities affecting splunk splunk enterprise are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Splunk / Splunk Enterprise
10.2 < 10.2.0 10.0 < 10.0.3 9.4 < 9.4.5 9.3 < 9.3.7 9.2 < 9.2.9
Splunk / Splunk Cloud Platform
10.1.2507 < 10.1.2507.0 10.0 < 10.0.2503.9 9.3.2411 < 9.3.2411.112 9.3.2408 < 9.3.2408.122
References
Credits
Anton (therceman)