vulnerability
Splunk: CVE-2025-20324: Improper Access Control in System Source Types Configuration in Splunk Enterprise
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:S/C:P/I:P/A:N) | Jul 7, 2025 | Jul 8, 2025 | Oct 31, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
Jul 7, 2025
Added
Jul 8, 2025
Modified
Oct 31, 2025
Description
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the “admin” or “power” Splunk roles could create or overwritesystem source typeconfigurations by sending a specially-crafted payload to the/servicesNS/nobody/search/admin/sourcetypes/REST endpoint on the Splunk management port.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.