In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
History

Wed, 26 Mar 2025 22:00:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
Title Sensitive Information Disclosure in Splunk Secure Gateway App
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2025-03-26T21:45:41.250Z

Updated: 2025-03-26T21:56:25.891Z

Reserved: 2024-10-10T19:15:13.237Z

Link: CVE-2025-20231

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-03-26T22:15:15.083

Modified: 2025-03-26T22:15:15.083

Link: CVE-2025-20231

cve-icon Redhat

No data.