🔐 CVE Alert

CVE-2026-20139

MEDIUM 4.3

Client-Side Denial of Service (DoS) through ''/splunkd/__raw/services/authentication/users/username'' REST API endpoint in Splunk Enterprise

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.8, 9.3.9, and 9.2.12, and Splunk Cloud Platform versions below 10.2.2510.3, 10.1.2507.8, 10.0.2503.9, and 9.3.2411.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload into the `realname`, `tz`, or `email` parameters of the `/splunkd/__raw/services/authentication/users/username` REST API endpoint when they change a password. This could potentially lead to a client‑side denial‑of‑service (DoS). The malicious payload might significantly slow page load times or render Splunk Web temporarily unresponsive.

CWE CWE-400
Vendor splunk
Product splunk enterprise
Published Feb 18, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for splunk splunk enterprise

Be the first to know when new medium vulnerabilities affecting splunk splunk enterprise are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Splunk / Splunk Enterprise
10.0 < 10.0.2 9.4 < 9.4.8 9.3 < 9.3.9 9.2 < 9.2.12
Splunk / Splunk Cloud Platform
10.2.2510 < 10.2.2510.3 10.1.2507 < 10.1.2507.8 10.0.2503 < 10.0.2503.9 9.3.2411 < 9.3.2411.121

References

NVD ↗ CVE.org ↗ EPSS Data ↗
advisory.splunk.com: https://advisory.splunk.com/advisories/SVD-2026-0204

Credits

STÖK / Fredrik Alexandersson