Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code

Posted on October 2, 2025October 2, 2025 By CWS

Splunk has launched patches for a number of vulnerabilities in its Enterprise and Cloud Platform merchandise, a few of which might permit attackers to execute unauthorized JavaScript code, entry delicate info, or trigger a denial-of-service (DoS) situation.

The advisories, printed on October 1, 2025, element six safety flaws, with severity rankings starting from Medium to Excessive.

Probably the most crucial vulnerability is a Server-Facet Request Forgery (SSRF) flaw, tracked as CVE-2025-20371, with a excessive CVSS rating of seven.5.

This vulnerability might permit an unauthenticated attacker to set off a blind SSRF, doubtlessly enabling them to carry out REST API calls on behalf of an authenticated, high-privileged consumer.

Profitable exploitation requires the enableSplunkWebClientNetloc setting to be enabled and sure includes phishing the sufferer to provoke a request from their browser.

Code Execution and Info Disclosure Flaws

Two vulnerabilities straight tackle the execution of unauthorized JavaScript code, a type of cross-site scripting (XSS).

CVE-2025-20367 (CVSS: 5.7): A low-privileged consumer can craft a malicious payload by the dataset.command parameter of a particular endpoint, resulting in the execution of JavaScript code in a consumer’s browser.

CVE-2025-20368 (CVSS: 5.7): Equally, a low-privileged consumer can inject a malicious payload into the error messages and job inspection particulars of a saved search, leading to unauthorized code execution.

One other important flaw, CVE-2025-20366 (CVSS: 6.5), permits for info disclosure. On this state of affairs, a low-privileged consumer with out ‘admin’ or ‘energy’ roles might entry the outcomes of an administrative search job operating within the background.

If the attacker appropriately guesses the distinctive Search ID (SID) of the job, they may retrieve doubtlessly delicate search outcomes.

Denial of Service and XXE Vulnerabilities

The safety replace additionally addresses three medium-severity vulnerabilities that would impression system availability and integrity:

CVE-2025-20370 (CVSS: 4.9): A consumer with the change_authentication functionality can ship a number of LDAP bind requests to an inside endpoint, inflicting excessive CPU utilization and a possible DoS that requires an occasion restart to resolve.

CVE-2025-20369 (CVSS: 4.6): A low-privileged consumer can carry out an XML Exterior Entity (XXE) injection by the dashboard tab label subject, which might additionally result in a DoS assault.

Affected Merchandise and Mitigations

The vulnerabilities have an effect on a number of variations of Splunk Enterprise and Splunk Cloud Platform. The affected Splunk Enterprise variations embrace these beneath 9.4.4, 9.3.6, and 9.2.8. For some flaws, model 10.0.0 can also be affected.

Splunk has launched patches and urges prospects to improve to the next or later variations:

CVE IDVulnerability TypeCVSS 3.1 ScoreAffected ProductAffected VersionsFixed VersionsCVE-2025-20366Information Disclosure6.5 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.111 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.111 9.3.2408.119 9.2.2406.122CVE-2025-20367Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122CVE-2025-20368Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20369XXE Injection4.6 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20370Denial of Service (DoS)4.9 (Medium)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20371Server-Facet Request Forgery (SSRF)7.5 (Excessive)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122

Splunk has confirmed it’s actively patching all Splunk Cloud Platform situations and can notify prospects upon completion.

For customers unable to use the updates instantly, a number of workarounds can be found. A typical mitigation for most of the vulnerabilities is to disable Splunk Internet if it isn’t required.

For the SSRF flaw (CVE-2025-20371), directors can mitigate the danger by setting enableSplunkWebClientNetloc to false within the internet.conf file.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Enterprise, Execute, JavaScript, Multiple, Splunk, Unauthorized, Vulnerabilities

Post navigation

Previous Post: Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware
Next Post: Microsoft Outlook for Windows Bug Leads to Crash While Opening Email

Related Posts

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News
Hackers Actively Compromising Databases Using Legitimate Commands Cyber Security News
OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark