vulnerability
Splunk CVE-2022-32154: Risky commands warnings in Splunk Enterprise dashboards
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:H/Au:N/C:C/I:C/A:N) | Jun 14, 2022 | Apr 7, 2025 | Apr 22, 2025 |
Severity
7
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:N)
Published
Jun 14, 2022
Added
Apr 7, 2025
Modified
Apr 22, 2025
Description
Dashboards in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2106 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypassesSPL safeguards for risky commands(i.e., Search Injection). SeeNew capabilities can limit access to some custom and potentially risky commandsfor more information. The vulnerability is browser-based and is not exploitable at will. It requires the attacker to initiate a request within the victim’s browser (e.g., phishing) or compromise an authorized user’s account. The vulnerability affects instances with Splunk Web enabled. SeeDisable unnecessary Splunk Enterprise componentsand theweb.confconfiguration file for more information on disabling Splunk Web in forwarders. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.
Solution
splunk-upgrade-latest

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.