vulnerability
Splunk: CVE-2025-20371: Unauthenticated Blind Server Side Request Forgery (SSRF) in Splunk Enterprise
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Oct 1, 2025 | Oct 6, 2025 | Mar 25, 2026 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Oct 1, 2025
Added
Oct 6, 2025
Modified
Mar 25, 2026
Description
In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119, and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF), potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.To be successful, the attack requires theenableSplunkWebClientNetlocsetting in theweb.confconfiguration file to have a value oftrue. Additionally, the attacker likely has to phish the victim by tricking them into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.See theweb.confconfiguration specification file for more information on the configuration settings.
Solution
splunk-upgrade-latest
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.