- Description
- In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF) potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
- Products
- splunk, splunk_cloud_platform
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@cisco.com
- CWE-918
- Hype score
- Not currently trending
Splunk discloses six critical vulnerabilities including XSS, SSRF (CVE-2025-20371), and DoS risks impacting Enterprise and Cloud Platform versions. Patching and mitigations are advised to prevent remote JS injection. #SplunkSecurity #RemoteCode #XSS https://t.co/19cQBfXdWG
@TweetThreatNews
3 Oct 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidad en productos Splunk ❗CVE-2025-20371 ➡️Más info: https://t.co/cHV8zh02b2 https://t.co/pX2FdJ32ek
@CERTpy
3 Oct 2025
96 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20371 and other: Multiple vulnerabilities in Splunk, 4.6 - 7.5 rating❗️ In a recent advisory, Splunk reported six vulnerabilities, including DoS, XXE, XSS, and Blind SSRF. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/y8khGa5mQ5 https://t.co/FiUQVFBlHX
@Netlas_io
2 Oct 2025
519 Impressions
1 Retweet
6 Likes
3 Bookmarks
0 Replies
0 Quotes
CVE-2025-20371 Unauthenticated Blind Server-Side Request Forgery in Splunk Enterprise and Cloud Platform https://t.co/mValzW6wcD
@VulmonFeeds
2 Oct 2025
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Splunk Enterprise CVE-2025-20371: Unauthenticated Blind SSRF A new SSRF vuln in Splunk Enterprise lets attackers relay requests unauthenticated. Admins should patch ASAP. For more details, read ZeroPath's blog on this vuln. #AppSec #InfoSec https://t.co/MCkJ7hk4MH
@ZeroPathLabs
1 Oct 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "724443E6-2DC9-4AB3-8E8F-D9BFBCC162E6",
"versionEndExcluding": "9.2.8",
"versionStartIncluding": "9.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "046659D8-1F48-4229-AC57-2A3B77D44442",
"versionEndExcluding": "9.3.6",
"versionStartIncluding": "9.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "88D2F283-10F9-4204-876A-9BEE75130E2C",
"versionEndExcluding": "9.4.4",
"versionStartIncluding": "9.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:10.0.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "259A3F4B-E4D2-48BC-9AE9-C37DE94987D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA1E6F9-415D-4062-BC4E-4EDFA6F6A7CA",
"versionEndExcluding": "9.2.2406.122",
"versionStartIncluding": "9.2.2406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BEB41CF-1F71-45BB-A434-984C16A2E174",
"versionEndExcluding": "9.3.2408.119",
"versionStartIncluding": "9.3.2408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5075451-6D11-4EA8-9BB5-9BB27ECF8A40",
"versionEndExcluding": "9.3.2411.109",
"versionStartIncluding": "9.3.2411",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]