PT-2025-48956 · Splunk · Splunk Cloud Platform+1

Published

2025-12-03

·

Updated

2025-12-05

·

CVE-2025-20384

CVSS v3.1

5.3

Medium

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Name of the Vulnerable Software and Affected Versions Splunk Enterprise versions prior to 10.0.1, 9.4.6, 9.3.8, and 9.2.10 Splunk Cloud Platform versions prior to 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125
Description An unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This can allow an attacker to manipulate, create, or hide sensitive log data using specifically designed HTTP requests, potentially affecting the reliability of logs and the ability to detect security events.
Recommendations Update Splunk Enterprise to version 10.0.1 or later. Update Splunk Enterprise to version 9.4.6 or later. Update Splunk Enterprise to version 9.3.8 or later. Update Splunk Enterprise to version 9.2.10 or later. Update Splunk Cloud Platform to version 10.1.2507.4 or later. Update Splunk Cloud Platform to version 10.0.2503.6 or later. Update Splunk Cloud Platform to version 9.3.2411.117.125 or later.

Fix

Weakness Enumeration

Related Identifiers

BDU:2025-16295
CVE-2025-20384

Affected Products

Splunk Cloud Platform
Splunk Enterprise