Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code

Posted on October 2, 2025October 2, 2025 By CWS

Splunk has launched patches for a number of vulnerabilities in its Enterprise and Cloud Platform merchandise, a few of which might permit attackers to execute unauthorized JavaScript code, entry delicate info, or trigger a denial-of-service (DoS) situation.

The advisories, printed on October 1, 2025, element six safety flaws, with severity rankings starting from Medium to Excessive.

Probably the most crucial vulnerability is a Server-Facet Request Forgery (SSRF) flaw, tracked as CVE-2025-20371, with a excessive CVSS rating of seven.5.

This vulnerability might permit an unauthenticated attacker to set off a blind SSRF, doubtlessly enabling them to carry out REST API calls on behalf of an authenticated, high-privileged consumer.

Profitable exploitation requires the enableSplunkWebClientNetloc setting to be enabled and sure includes phishing the sufferer to provoke a request from their browser.

Code Execution and Info Disclosure Flaws

Two vulnerabilities straight tackle the execution of unauthorized JavaScript code, a type of cross-site scripting (XSS).

CVE-2025-20367 (CVSS: 5.7): A low-privileged consumer can craft a malicious payload by the dataset.command parameter of a particular endpoint, resulting in the execution of JavaScript code in a consumer’s browser.

CVE-2025-20368 (CVSS: 5.7): Equally, a low-privileged consumer can inject a malicious payload into the error messages and job inspection particulars of a saved search, leading to unauthorized code execution.

One other important flaw, CVE-2025-20366 (CVSS: 6.5), permits for info disclosure. On this state of affairs, a low-privileged consumer with out ‘admin’ or ‘energy’ roles might entry the outcomes of an administrative search job operating within the background.

If the attacker appropriately guesses the distinctive Search ID (SID) of the job, they may retrieve doubtlessly delicate search outcomes.

Denial of Service and XXE Vulnerabilities

The safety replace additionally addresses three medium-severity vulnerabilities that would impression system availability and integrity:

CVE-2025-20370 (CVSS: 4.9): A consumer with the change_authentication functionality can ship a number of LDAP bind requests to an inside endpoint, inflicting excessive CPU utilization and a possible DoS that requires an occasion restart to resolve.

CVE-2025-20369 (CVSS: 4.6): A low-privileged consumer can carry out an XML Exterior Entity (XXE) injection by the dashboard tab label subject, which might additionally result in a DoS assault.

Affected Merchandise and Mitigations

The vulnerabilities have an effect on a number of variations of Splunk Enterprise and Splunk Cloud Platform. The affected Splunk Enterprise variations embrace these beneath 9.4.4, 9.3.6, and 9.2.8. For some flaws, model 10.0.0 can also be affected.

Splunk has launched patches and urges prospects to improve to the next or later variations:

CVE IDVulnerability TypeCVSS 3.1 ScoreAffected ProductAffected VersionsFixed VersionsCVE-2025-20366Information Disclosure6.5 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.111 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.111 9.3.2408.119 9.2.2406.122CVE-2025-20367Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122CVE-2025-20368Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20369XXE Injection4.6 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20370Denial of Service (DoS)4.9 (Medium)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20371Server-Facet Request Forgery (SSRF)7.5 (Excessive)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122

Splunk has confirmed it’s actively patching all Splunk Cloud Platform situations and can notify prospects upon completion.

For customers unable to use the updates instantly, a number of workarounds can be found. A typical mitigation for most of the vulnerabilities is to disable Splunk Internet if it isn’t required.

For the SSRF flaw (CVE-2025-20371), directors can mitigate the danger by setting enableSplunkWebClientNetloc to false within the internet.conf file.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Enterprise, Execute, JavaScript, Multiple, Splunk, Unauthorized, Vulnerabilities

Post navigation

Previous Post: Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware
Next Post: Microsoft Outlook for Windows Bug Leads to Crash While Opening Email

Related Posts

BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News
New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News
Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News