- Description
- In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and response bodies that contain sensitive data.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
- Products
- splunk, splunk_cloud_platform
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- psirt@cisco.com
- CWE-532
- Hype score
- Not currently trending
شركة (Splunk) نزلت ٣ تحديثات أمنية للمنتجات التالية 📍 ثغرة (CVE-2026-20238 | CVSS 6.5) المنتج المتأثر: (Splunk AI Toolkit) 📍 ثغرة (CVE-2026-20239 | CVSS 7.5) المنتج المتأثر: (Splunk Enterprise) و (Splu
@buhaimedi
24 May 2026
3184 Impressions
1 Retweet
26 Likes
23 Bookmarks
1 Reply
0 Quotes
خطرناک اون زمانی هست که برای سیستم تشخیص نفوذ باگ منتشر بشه . برای Splunk چند آسیب پذیری با کدهای شناسایی CVE-2026-20238 و CVE-2026-20239 و CVE-2026-20240 منتشر شده که علاوه بر ای
@EthicalSafe
22 May 2026
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Splunkが深刻な脆弱性を修正。DoSのCVE-2026-20240やエラー時のバッファ漏洩CVE-2026-20239、AI Toolkitの機密情報漏洩CVE-2026-20238。 https://t.co/v5Y8zWQPFh
@__kokumoto
22 May 2026
728 Impressions
1 Retweet
4 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "D5A01879-50A5-4266-A08C-F55584F442ED",
"versionEndExcluding": "10.0.5",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "9F3A147D-2A67-469A-A223-248DEFB413E0",
"versionEndExcluding": "10.2.2",
"versionStartIncluding": "10.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C098C2-9ED5-41B4-BE57-984B71027144",
"versionEndExcluding": "10.0.2503.13",
"versionStartIncluding": "10.0.2503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C302734-E81B-49DE-B3D6-ACD20DD3A57A",
"versionEndExcluding": "10.1.2507.21",
"versionStartIncluding": "10.1.2507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F7423BE-EADA-4D07-A021-D0F9EBBF966F",
"versionEndExcluding": "10.2.2510.11",
"versionStartIncluding": "10.2.2510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E24DFCE-B632-49F0-9198-A21636FC3D59",
"versionEndExcluding": "10.3.2512.8",
"versionStartIncluding": "10.3.2512",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]