CVE-2025-22621

6.4 MEDIUM

📋 TL;DR

CVE-2025-22621 is an improper access control vulnerability in Splunk App for SOAR where following the official documentation's recommendation to add the 'admin_all_objects' capability to the 'splunk_app_soar' role grants excessive privileges to non-admin users. This affects organizations using Splunk App for SOAR versions 1.0.67 and lower where the vulnerable configuration was implemented. Attackers with low-privileged Splunk accounts could gain unauthorized access to sensitive data and administrative functions.

💻 Affected Systems

Products:
  • Splunk App for SOAR
Versions: 1.0.67 and lower
Operating Systems: All platforms running Splunk Enterprise
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the 'admin_all_objects' capability was added to the 'splunk_app_soar' role as recommended in the now-deprecated documentation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with any non-admin Splunk account could gain full administrative control over the Splunk App for SOAR, potentially accessing sensitive security orchestration data, modifying automation workflows, and compromising the entire SOAR environment.

🟠

Likely Case

Low-privileged users could access and modify SOAR objects they shouldn't have permission to, leading to data exposure, unauthorized workflow changes, and privilege escalation within the SOAR environment.

🟢

If Mitigated

With proper role-based access controls and following updated documentation, users only have appropriate permissions for their roles, preventing unauthorized access to SOAR objects.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid Splunk user account (even low-privileged) and the vulnerable configuration to be in place. The attack is straightforward once these conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.68 or higher

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2025-0101

Restart Required: Yes

Instructions:

1. Update Splunk App for SOAR to version 1.0.68 or higher via Splunk Web or command line. 2. Restart Splunk Enterprise. 3. Review and update role configurations to remove 'admin_all_objects' capability from 'splunk_app_soar' role if previously added.

🔧 Temporary Workarounds

Remove excessive capability from role

all

Manually remove the 'admin_all_objects' capability from the 'splunk_app_soar' role configuration

splunk edit user splunk_app_soar -capability -admin_all_objects

🧯 If You Can't Patch

  • Immediately remove the 'admin_all_objects' capability from the 'splunk_app_soar' role configuration
  • Implement strict access controls and audit all user activities in the SOAR environment

🔍 How to Verify

Check if Vulnerable:

Check if 'admin_all_objects' capability is assigned to 'splunk_app_soar' role: splunk list user splunk_app_soar -auth admin:changeme | grep capabilities

Check Version:

splunk display app splunk_app_soar -auth admin:changeme | grep version

Verify Fix Applied:

Verify the capability is removed and app version is 1.0.68+: splunk display app splunk_app_soar -auth admin:changeme

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to SOAR objects
  • Privilege escalation events in Splunk audit logs
  • Unexpected modifications to SOAR workflows or configurations

Network Indicators:

  • Unusual API calls to SOAR endpoints from non-admin accounts

SIEM Query:

index=_audit action=access_denied app=splunk_app_soar | stats count by user

🔗 References

📤 Share & Export