CVE-2025-20366
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-08
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| splunk | splunk | From 9.2.0 (inc) to 9.2.8 (exc) |
| splunk | splunk | From 9.3.0 (inc) to 9.3.6 (exc) |
| splunk | splunk | From 9.4.0 (inc) to 9.4.4 (exc) |
| splunk | splunk_cloud_platform | From 9.2.2406 (inc) to 9.2.2406.122 (exc) |
| splunk | splunk_cloud_platform | From 9.3.2408 (inc) to 9.3.2408.119 (exc) |
| splunk | splunk_cloud_platform | From 9.3.2411 (inc) to 9.3.2411.111 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in certain versions of Splunk Enterprise and Splunk Cloud Platform where a low-privileged user, who does not have admin or power roles, can access sensitive search results if an administrative search job is running in the background. If the user guesses the unique Search ID (SID) of that job, they can retrieve the results, potentially exposing sensitive information.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of sensitive search results to low-privileged users. This exposure could result in leakage of confidential or sensitive data, which might compromise the security and privacy of the information managed within Splunk.