Splunk issues a series of security advisories highlighting multiple critical vulnerabilities.

Splunk has released a series of vulnerability advisories for July 2025. These advisories, identified as SVD-2025-0712 through SVD-2025-0701, highlight important security updates and address several vulnerabilities across Splunk’s product suite. Below, we provide a comprehensive overview of these advisories, their impact, and recommended actions for Splunk administrators and security professionals.

SVD-2025-0712 and SVD-2025-0711: Third-Party Package Updates

  • Severity: Critical

Splunk SOAR and Splunk Universal Forwarder have both received critical updates to their bundled third-party packages. These updates address multiple vulnerabilities (CVEs) discovered in underlying libraries and dependencies. While no active exploits have been reported, administrators are strongly encouraged to apply these updates promptly to maintain a secure environment and reduce the attack surface.

SVD-2025-0712: Third-Party Package Updates in Splunk SOAR

  • Scope: This advisory covers multiple vulnerabilities identified in third-party libraries included with Splunk SOAR.
  • Risk: The vulnerabilities addressed may range in severity and could enable attackers to exploit issues such as privilege escalation, information disclosure, or remote code execution if left unpatched.
  • Action Required: Splunk SOAR users should promptly apply the latest updates to ensure all bundled components are secure.

SVD-2025-0711: Third-Party Package Updates in Splunk Universal Forwarder

  • Scope: This advisory details updates to third-party packages within Splunk Universal Forwarder, addressing multiple CVEs.
  • Risk: Vulnerabilities in these packages may expose systems to various risks, including security bypass, data leakage, or potential system compromise.
  • Action Required: Administrators are advised to update Splunk Universal Forwarder to the latest version to remediate these vulnerabilities.

SVD-2025-0710: Third-Party Package Updates in Splunk Enterprise

  • CVE IDs: Multiple
  • Severity: Critical

Multiple vulnerabilities were identified in third-party libraries used by Splunk Enterprise. The affected components and their respective CVEs are summarized below. The vulnerabilities vary in severity, ranging from medium to critical, and could potentially expose systems to risks such as privilege escalation, information disclosure, or remote code execution if left unpatched.

Affected Packages and CVEs

PackageUpgraded VersionCVE(s)Severity
setuptools70.0.0CVE-2024-6345High
golang.org/x/crypto0.36.0/0.37.0CVE-2025-22869, CVE-2024-45337, MultipleHigh/Critical
golang.org/x/net0.37.0/0.39.0CVE-2024-45338Medium
golang1.24.0/1.24.2MultipleHigh
Beaker1.12.1CVE-2013-7489Medium
azure-storage-blob12.13.0CVE-2022-30187Medium
OpenSSL1.0.2zlCVE-2024-13176, CVE-2024-9143Low/Info
libcurl8.11.1CVE-2024-0853, CVE-2024-2398, MultipleHigh

Impact

  • Risk Exposure: The vulnerabilities addressed may enable attackers to exploit issues such as privilege escalation, information disclosure, or remote code execution.
  • Severity: The advisory covers CVEs with severities ranging from medium to critical, underscoring the importance of timely updates.

Affected Products and Versions

ProductBase VersionAffected VersionsFixed Version
Splunk Enterprise9.49.4.0 to 9.4.29.4.3
Splunk Enterprise9.39.3.0 to 9.3.49.3.5
Splunk Enterprise9.29.2.0 to 9.2.69.2.7
Splunk Enterprise9.19.1.0 to 9.1.99.1.10

SVD-2025-0709: Sensitive Information Disclosure in Clustered Deployments

  • CVE: CVE-2025-20325
  • Severity: Low (CVSS 3.1 Score: 3.1)

A vulnerability in Splunk Enterprise and Splunk Cloud Platform may expose the search head cluster secret key in the SHCConfig log channel when set to DEBUG level. Exploitation requires local or administrative access to logs or internal indexes. Splunk recommends restricting access to sensitive logs and indexes to administrator-level roles only.

SVD-2025-0708: Improper Access Control on Read-Only Alerts

  • CVE: CVE-2025-20326
  • Severity: Medium

An access control flaw in Splunk Enterprise allows low-privilege users to suppress certain read-only alerts. This could potentially hinder timely response to security incidents. Organizations should review user permissions and apply the latest patches to mitigate this risk.

SVD-2025-0707: Access Control Weakness in System Source Types Configuration

  • CVE: CVE-2025-20324
  • Severity: Medium

This vulnerability involves improper access controls in the configuration of system source types within Splunk Enterprise. Unauthorized users may be able to modify configurations, potentially impacting data integrity and system operations. Prompt patching and strict access management are advised.

SVD-2025-0706: Missing Access Control in Splunk Archiver App

  • CVE: CVE-2025-20323
  • Severity: Medium (CVSS 3.1 Score: 4.3)

The Splunk Archiver app was found to lack adequate access controls for saved searches, creating the risk of unauthorized access or modification. Splunk recommends updating to the latest version and reviewing saved search permissions.

SVD-2025-0705: Denial of Service via Cross-Site Request Forgery

  • CVE: CVE-2025-20322
  • Severity: Medium (CVSS 3.1 Score: 4.3)

A Cross-Site Request Forgery (CSRF) vulnerability in Splunk’s Search Head Cluster could allow an unauthenticated attacker to trigger a rolling restart, resulting in a temporary denial of service. Successful exploitation requires phishing an administrator-level user. Administrators should educate users on phishing risks and apply security updates.

SVD-2025-0704: CSRF Vulnerability Risks Search Head Cluster Stability

  • CVE: CVE-2025-20321
  • Severity: Medium (CVSS 3.1 Score: 6.5)

A CSRF vulnerability in Splunk Enterprise and Splunk Cloud Platform could allow an unauthenticated attacker to manipulate the membership state of a Search Head Cluster. By exploiting this flaw, an attacker could potentially remove the cluster captain or a member, leading to possible instability or downtime within the cluster.

Attack Prerequisites

  • User Interaction Required: The attacker must trick an administrator-level user into executing a malicious SPL search, typically through phishing or social engineering.
  • No Direct Exploit: The vulnerability cannot be exploited without user interaction; the attacker relies on convincing an administrator to initiate the malicious request in their browser session.

Potential Impact

  • Cluster Disruption: Successful exploitation could result in the removal of key cluster members, including the captain, thereby affecting the availability and stability of the SHC.
  • Service Availability: While there is no direct risk to data confidentiality or integrity, the vulnerability poses a significant threat to service uptime and operational continuity.

Affected Versions

  • Splunk Enterprise: Versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10
  • Splunk Cloud Platform: Versions below 9.3.2411.104, 9.3.2408.114, and 9.2.2406.119

CVSS v3.1 Details

  • Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • Base Score: 6.5 (Medium)
  • Impact: High on availability; no impact on confidentiality or integrity.

SVD-2025-0703: Path Traversal Vulnerability Enables Denial of Service

  • CVE: CVE-2025-20320
  • Severity: Medium (CVSS 3.1 Score: 6.3)

A path traversal vulnerability exists in Splunk Enterprise and Splunk Cloud Platform versions below the fixed releases. A low-privileged user—without “admin” or “power” roles—could craft a malicious payload through the “User Interface – Views” configuration page. If an administrator-level victim is phished into executing the payload in their browser, the attacker could delete arbitrary files within the Splunk directory, potentially resulting in a denial of service.

Attack Prerequisites

  • User Interaction Required: The attacker must trick an administrator-level user into initiating a malicious request, usually via phishing or social engineering.
  • No Direct Exploit: The vulnerability cannot be exploited at will by the attacker; administrator interaction is required.

Potential Impact

  • Denial of Service: Exploitation can result in deletion of critical files, causing service disruption or downtime.
  • Limited Scope: The vulnerability does not impact confidentiality, but poses a risk to availability and, to a lesser extent, integrity.

Affected Versions

  • Splunk Enterprise: Versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10
  • Splunk Cloud Platform: Versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121

CVSS v3.1 Details

  • Vector: AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
  • Base Score: 6.3 (Medium)
  • Impact: High on availability, low on integrity, none on confidentiality.

SVD-2025-0702: Remote Command Execution via Scripted Input Files

  • CVE: CVE-2025-20319
  • Severity: Medium (CVSS 3.1 Score: 6.8)

A remote command execution vulnerability exists in Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10. The flaw arises from insufficient sanitization of user input in scripted input files. Users with the edit_scripted and list_inputs capabilities can exploit this weakness to execute arbitrary commands on the underlying system, potentially leading to data compromise or service disruption.

Attack Prerequisites

  • High-Privilege Role Required: The attacker must possess a role with both edit_scripted and list_inputs capabilities.
  • No User Interaction Needed: The exploit does not require social engineering or phishing; it can be performed by a privileged user directly.

Potential Impact

  • Remote Command Execution: Successful exploitation allows arbitrary command execution on the Splunk server.
  • System Compromise: Attackers may gain control over the Splunk instance, access sensitive data, or disrupt operations.
  • High Confidentiality, Integrity, and Availability Impact: The vulnerability affects all three core security principles.

Affected Versions

  • Splunk Enterprise: Versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10

CVSS v3.1 Details

  • Vector: AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Base Score: 6.8 (Medium)
  • Impact: High on confidentiality, integrity, and availability.

SVD-2025-0701: Third-Party Package Updates in Splunk DB Connect

  • CVE IDs: Multiple
  • Severity: Critical

Multiple vulnerabilities were identified in third-party libraries used by Splunk DB Connect. The affected components and their respective CVEs are summarized below. The vulnerabilities vary in severity and impact, ranging from medium to high, and could potentially expose systems to risks such as information disclosure, privilege escalation, or remote code execution if left unpatched.

Affected Packages and CVEs

PackageUpgraded VersionCVE(s)Severity
bcprov-jdk15on1.7.9CVE-2024-29857Medium
pyopenSSL24.2.1CVE-2023-5363High
dompurify2.5.4CVE-2024-45801, CVE-2024-47875High
requirejs2.3.7CVE-2024-38999High
mysql-connector-python9.1.0CVE-2024-21272, CVE-2024-21090High

Affected Products

  • Splunk DB Connect: Versions below 4.0.0

Summary Table

Advisory IDTitle/IssueCVE(s)SeverityDescription
SVD-2025-0712Third-Party Package Updates in Splunk SOARMultipleNot specifiedRoutine update addressing third-party library vulnerabilities
SVD-2025-0711Third-Party Package Updates in Splunk Universal ForwarderMultipleNot specifiedRoutine update addressing third-party library vulnerabilities
SVD-2025-0709Sensitive Info Disclosure in SHCConfig Logging (Clustered Deployments)CVE-2025-20325LowPotential exposure of secret key in logs; restrict log access
SVD-2025-0708Improper Access Control Lets Low-Privilege Users Suppress Read-Only AlertsCVE-2025-20326Not specifiedLow-privilege users can suppress alerts; review permissions
SVD-2025-0707Improper Access Control in System Source Types ConfigurationCVE-2025-20324Not specifiedUnauthorized changes to source type configuration possible
SVD-2025-0706Missing Access Control of Saved Searches in Splunk Archiver AppCVE-2025-20323MediumUnauthorized access or modification of saved searches
SVD-2025-0705DoS in Search Head Cluster via CSRFCVE-2025-20322MediumCSRF can trigger rolling restart, causing DoS; user awareness and patching recommended
SVD-2025-0704Membership State Change in Splunk Search Head Cluster via CSRFCVE-2025-20321MediumCSRF allows membership state change in SHC via admin-level phishing
SVD-2025-0703Denial of Service (DoS) through “User Interface – Views“ configuration page in Splunk EnterpriseCVE-2025-20320MediumPath traversal in UI allows DoS via arbitrary file deletion
SVD-2025-0702Remote Command Execution through Scripted Input Files in Splunk EnterpriseCVE-2025-20319MediumRCE via scripted input file sanitization flaw
SVD-2025-0701Third-Party Package Updates in Splunk DB Connect – July 2025Multiple (see above)HighThird-party package vulnerabilities in DB Connect

Recommendations

  • Apply Updates Promptly: Ensure all Splunk products and apps are updated to the latest versions.
  • Review Access Controls: Limit access to sensitive logs, configurations, and saved searches to administrator-level roles.
  • Educate Users: Train administrators on phishing and CSRF risks.
  • Monitor Official Advisories: Stay informed via Splunk’s security advisories page for ongoing updates.

Splunk’s regular release of vulnerability advisories underscores the importance of proactive security management. By staying current with patches and best practices, organizations can effectively mitigate risks and maintain a robust security posture.

For more detailed technical information or guidance tailored to your environment, contact your Splunk representative or consult the official Splunk documentation.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply