In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2025-1001 |
Configurations
No configuration.
History
01 Oct 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-01 17:15
Updated : 2025-10-02 19:11
NVD link : CVE-2025-20366
Mitre link : CVE-2025-20366
CVE.ORG link : CVE-2025-20366
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control