vulnerability
Splunk: CVE-2025-20325: Sensitive Information Disclosure in the SHCConfig logging channel in Clustered Deployments in Splunk Enterprise
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:M/Au:S/C:P/I:N/A:N) | Jul 7, 2025 | Jul 8, 2025 | Oct 31, 2025 |
Severity
3
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:N)
Published
Jul 7, 2025
Added
Jul 8, 2025
Modified
Oct 31, 2025
Description
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.113, and 9.2.2406.119, the software potentially exposes the search head clustersplunk.secretkey. This exposure could happen if you have a Search Head cluster and you configure the Splunk EnterpriseSHCConfiglog channel at the DEBUG logging level in the clustered deployment.The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles.SeeDefine roles on the Splunk platform with capabilities,Deploy a search head cluster,Deploy secure passwords across multiple serversandSet a security key for the search head clusterfor more information.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.