CVE-2025-20366

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
Configurations

No configuration.

History

01 Oct 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 17:15

Updated : 2025-10-02 19:11


NVD link : CVE-2025-20366

Mitre link : CVE-2025-20366

CVE.ORG link : CVE-2025-20366


JSON object : View

Products Affected

No product.

CWE
CWE-284

Improper Access Control