vulnerability
Splunk: CVE-2025-20300: Improper Access Control Lets Low-Privilege Users Suppress Read-Only Alerts in Splunk Enterprise
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:P/A:N) | Jul 7, 2025 | Jul 8, 2025 | Oct 31, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Jul 7, 2025
Added
Jul 8, 2025
Modified
Oct 31, 2025
Description
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the “admin” or “power” Splunk roles, and has read-only access to a specific alert, could suppress that alert when it triggers. SeeDefine alert suppression groups to throttle sets of similar alerts.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.