Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

Posted on June 3, 2025June 3, 2025 By CWS

A big safety vulnerability within the Splunk Enterprise platform may permit low-privileged attackers to execute unauthorized JavaScript code by a mirrored Cross-Web site Scripting (XSS) flaw. 

The vulnerability, tracked as CVE-2025-20297, impacts a number of variations of Splunk Enterprise and Splunk Cloud Platform, prompting the corporate to concern instant safety updates.

The mirrored XSS vulnerability resides inside Splunk Enterprise’s dashboard PDF era part, particularly focusing on the pdfgen/render REST endpoint. 

Splunk Enterprise XSS Vulnerability

This safety flaw allows attackers with minimal system privileges to craft malicious payloads that may execute arbitrary JavaScript code in sufferer browsers. 

The vulnerability is assessed underneath CWE-79 (Cross-Web site Scripting) and has been assigned a CVSSv3.1 rating of 4.3, indicating a medium-severity danger stage.

The assault vector is especially regarding as a result of it requires solely low-level consumer privileges, excluding these with “admin” or “energy” Splunk roles. 

Which means that normal customers with restricted entry can probably exploit the vulnerability to compromise different customers’ classes. 

The CVSSv3.1 vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N signifies that the assault may be executed remotely with low complexity, requiring low privileges however no consumer interplay.

Danger FactorsDetailsAffected ProductsSplunk Enterprise, all releases under 9.4.2, 9.3.4, and 9.2.6Splunk Internet part in Enterprise variations 9.4.1, 9.3.0 by 9.3.3, and 9.2.0 by 9.2.5ImpactExecution of unauthorized JavaScriptExploit PrerequisitesLow-privileged consumer (non-admin/energy), Authenticated entry to Splunk WebCVSS 3.1 Score4.3 (Medium)

The vulnerability impacts a broad vary of Splunk merchandise throughout a number of model branches. 

For Splunk Enterprise, affected variations embody all releases under 9.4.2, 9.3.4, and 9.2.6. Particularly, the Splunk Internet part in Enterprise variations 9.4.1, 9.3.0 by 9.3.3, and 9.2.0 by 9.2.5 accommodates the vulnerability. 

Notably, Splunk Enterprise 9.1 variations stay unaffected by this safety concern. Splunk Cloud Platform customers are equally impacted, with weak variations together with these under 9.3.2411.102, 9.3.2408.111, and 9.2.2406.118. 

The vulnerability particularly impacts situations with Splunk Internet enabled, as this part handles the PDF era performance the place the XSS flaw exists. The bug was found by Klevis Luli from Splunk’s safety group.

Mitigation Methods 

Splunk strongly recommends instant upgrading to patched variations to handle this vulnerability. For Enterprise customers, the really helpful repair variations are 9.4.2, 9.3.4, 9.2.6, or increased. 

The corporate is actively monitoring and routinely patching affected Splunk Cloud Platform situations to make sure buyer safety.

As an interim workaround, organizations can disable Splunk Internet performance fully, successfully eliminating the assault vector for the reason that vulnerability particularly targets the net interface’s PDF era part. 

This mitigation may be applied by the net.conf configuration file, although it could considerably affect consumer expertise and dashboard performance.

Safety groups ought to prioritize this replace given the potential for session hijacking and unauthorized code execution. Whereas the vulnerability requires authenticated entry, the low privilege necessities make it accessible to a broader vary of potential attackers. 

Organizations also needs to assessment their consumer privilege assignments and take into account implementing extra monitoring across the pdfgen/render endpoint till patches are totally deployed throughout their Splunk infrastructure.

Dwell Credential Theft Assault Unmask & On the spot Protection – Free Webinar

Cyber Security News Tags:Attackers, Code, Enterprise, Execute, JavaScript, Splunk, Unauthorized, Vulnerability, XSS

Post navigation

Previous Post: New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
Next Post: Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads

Related Posts

Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk Cyber Security News
CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
Anthropic Enhances Claude Cowork with New Projects Feature Anthropic Enhances Claude Cowork with New Projects Feature Cyber Security News
Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark