CVE-2025-20297

In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through the pdfgen/render REST endpoint that could result in execution of unauthorized JavaScript code in the browser of a user.
Configurations

No configuration.

History

04 Jun 2025, 14:54

Type Values Removed Values Added
Summary
  • (es) En las versiones de Splunk Enterprise anteriores a 9.4.2, 9.3.4 y 9.2.6, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2411.102, 9.3.2408.111 y 9.2.2406.118, un usuario con privilegios bajos que no tenga los roles de "admin" o "power" de Splunk podría manipular un payload malicioso a través del endpoint REST pdfgen/render que podría resultar en la ejecución de código JavaScript no autorizado en el navegador de un usuario.

02 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-02 18:15

Updated : 2025-06-04 14:54


NVD link : CVE-2025-20297

Mitre link : CVE-2025-20297

CVE.ORG link : CVE-2025-20297


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')