Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code

Posted on October 2, 2025October 2, 2025 By CWS

Splunk has launched patches for a number of vulnerabilities in its Enterprise and Cloud Platform merchandise, a few of which might permit attackers to execute unauthorized JavaScript code, entry delicate info, or trigger a denial-of-service (DoS) situation.

The advisories, printed on October 1, 2025, element six safety flaws, with severity rankings starting from Medium to Excessive.

Probably the most crucial vulnerability is a Server-Facet Request Forgery (SSRF) flaw, tracked as CVE-2025-20371, with a excessive CVSS rating of seven.5.

This vulnerability might permit an unauthenticated attacker to set off a blind SSRF, doubtlessly enabling them to carry out REST API calls on behalf of an authenticated, high-privileged consumer.

Profitable exploitation requires the enableSplunkWebClientNetloc setting to be enabled and sure includes phishing the sufferer to provoke a request from their browser.

Code Execution and Info Disclosure Flaws

Two vulnerabilities straight tackle the execution of unauthorized JavaScript code, a type of cross-site scripting (XSS).

CVE-2025-20367 (CVSS: 5.7): A low-privileged consumer can craft a malicious payload by the dataset.command parameter of a particular endpoint, resulting in the execution of JavaScript code in a consumer’s browser.

CVE-2025-20368 (CVSS: 5.7): Equally, a low-privileged consumer can inject a malicious payload into the error messages and job inspection particulars of a saved search, leading to unauthorized code execution.

One other important flaw, CVE-2025-20366 (CVSS: 6.5), permits for info disclosure. On this state of affairs, a low-privileged consumer with out ‘admin’ or ‘energy’ roles might entry the outcomes of an administrative search job operating within the background.

If the attacker appropriately guesses the distinctive Search ID (SID) of the job, they may retrieve doubtlessly delicate search outcomes.

Denial of Service and XXE Vulnerabilities

The safety replace additionally addresses three medium-severity vulnerabilities that would impression system availability and integrity:

CVE-2025-20370 (CVSS: 4.9): A consumer with the change_authentication functionality can ship a number of LDAP bind requests to an inside endpoint, inflicting excessive CPU utilization and a possible DoS that requires an occasion restart to resolve.

CVE-2025-20369 (CVSS: 4.6): A low-privileged consumer can carry out an XML Exterior Entity (XXE) injection by the dashboard tab label subject, which might additionally result in a DoS assault.

Affected Merchandise and Mitigations

The vulnerabilities have an effect on a number of variations of Splunk Enterprise and Splunk Cloud Platform. The affected Splunk Enterprise variations embrace these beneath 9.4.4, 9.3.6, and 9.2.8. For some flaws, model 10.0.0 can also be affected.

Splunk has launched patches and urges prospects to improve to the next or later variations:

CVE IDVulnerability TypeCVSS 3.1 ScoreAffected ProductAffected VersionsFixed VersionsCVE-2025-20366Information Disclosure6.5 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.111 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.111 9.3.2408.119 9.2.2406.122CVE-2025-20367Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122CVE-2025-20368Cross-Web site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20369XXE Injection4.6 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20370Denial of Service (DoS)4.9 (Medium)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.108 Beneath 9.3.2408.118 Beneath 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123CVE-2025-20371Server-Facet Request Forgery (SSRF)7.5 (Excessive)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8Splunk Cloud PlatformBelow 9.3.2411.109 Beneath 9.3.2408.119 Beneath 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122

Splunk has confirmed it’s actively patching all Splunk Cloud Platform situations and can notify prospects upon completion.

For customers unable to use the updates instantly, a number of workarounds can be found. A typical mitigation for most of the vulnerabilities is to disable Splunk Internet if it isn’t required.

For the SSRF flaw (CVE-2025-20371), directors can mitigate the danger by setting enableSplunkWebClientNetloc to false within the internet.conf file.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Enterprise, Execute, JavaScript, Multiple, Splunk, Unauthorized, Vulnerabilities

Post navigation

Previous Post: Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware
Next Post: Microsoft Outlook for Windows Bug Leads to Crash While Opening Email

Related Posts

Microsoft December 2025 Patch Tuesday Microsoft December 2025 Patch Tuesday Cyber Security News
Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Cyber Security News
Critical Flaw in Synology DSM Risks Remote Exploitation Critical Flaw in Synology DSM Risks Remote Exploitation Cyber Security News
Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Cyber Security News
New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies Cyber Security News
New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark