CVE-2025-20319
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-07-21

Assigner: Cisco Systems, Inc.

Description
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability `edit_scripted` and `list_inputs` capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.<br><br>See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) and [Setting up a scripted input ](https://docs.splunk.com/Documentation/Splunk/9.4.2/AdvancedDev/ScriptSetup)for more information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-07-21
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
splunk splunk From 9.1.0 (inc) to 9.1.10 (exc)
splunk splunk From 9.2.0 (inc) to 9.2.7 (exc)
splunk splunk From 9.3.0 (inc) to 9.3.5 (exc)
splunk splunk From 9.4.0 (inc) to 9.4.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Splunk Enterprise versions prior to 9.4.3, 9.3.5, 9.2.7, and 9.1.10 allows a user with roles containing both the high-privilege capabilities 'edit_scripted' and 'list_inputs' to perform remote command execution. It occurs due to improper sanitization of user input in scripted input files, which enables execution of arbitrary commands remotely. [1]


How can this vulnerability impact me? :

The vulnerability can lead to remote command execution by a privileged user, potentially compromising the confidentiality, integrity, and availability of the affected system. An attacker could execute arbitrary commands remotely, which may result in unauthorized access, data breaches, or disruption of services. [1]


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate steps to mitigate this vulnerability are to upgrade Splunk Enterprise to versions 9.4.3, 9.3.5, 9.2.7, or 9.1.10 or later. If upgrading is not feasible immediately, remove the 'edit_scripted' capability from user roles to prevent exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart