Splunk Security Vulnerabilities (CVEs)

Track 82 security vulnerabilities affecting Splunk products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

5 Critical
45 High
27 Medium
5 Low
🔔 Get Alerts for Splunk
CVE-2026-20144 6.8

This vulnerability allows authenticated users with access to Splunk's _internal index to view SAML configuration data in plain text within log files. ...

Feb 18, 2026
CVE-2026-20141 4.3

A low-privileged user without admin role can access Splunk Monitoring Console endpoints due to improper access control in vulnerable Splunk Enterprise...

Feb 18, 2026
CVE-2026-20138 6.8

This vulnerability allows users with access to Splunk's _internal index to view sensitive authentication secrets in plain text. Specifically, Duo Two-...

Feb 18, 2026
CVE-2025-20386 8.0

This vulnerability allows non-administrator users on Windows systems to access the Splunk Enterprise installation directory and all its contents after...

Dec 3, 2025
CVE-2025-20387 8.0

This vulnerability allows non-administrator users on Windows systems to access the Splunk Universal Forwarder installation directory and all its conte...

Dec 3, 2025
CVE-2025-20388 2.7

This vulnerability allows authenticated users with the 'change_authentication' capability to enumerate internal IP addresses and network ports when ad...

Dec 3, 2025
CVE-2025-20389 4.3

A low-privileged user without admin or power roles can craft a malicious payload in the label column field when adding a new device in the Splunk Secu...

Dec 3, 2025
CVE-2025-20382 3.5

This CVE describes an unvalidated redirect vulnerability in Splunk Enterprise and Cloud Platform where low-privileged authenticated users can create d...

Dec 3, 2025
CVE-2025-20383 4.3

This vulnerability allows low-privileged Splunk users who subscribe to mobile push notifications to receive notification titles and descriptions for r...

Dec 3, 2025
CVE-2025-20384 5.3

An unauthenticated attacker can inject ANSI escape codes into Splunk log files via the /en-US/static/ endpoint, allowing them to manipulate or obfusca...

Dec 3, 2025
CVE-2025-20385 2.4

This is a stored cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform. An authenticated user with admin_all_objects...

Dec 3, 2025
CVE-2025-20379 3.5

This vulnerability allows low-privileged Splunk users to bypass SPL safeguards for risky commands by exploiting character encoding in REST API paths. ...

Nov 12, 2025
CVE-2025-20378 3.1

This vulnerability allows unauthenticated attackers to craft malicious URLs that exploit an unvalidated redirect in Splunk Web's login endpoint. When ...

Nov 12, 2025
CVE-2025-20370 4.9

This vulnerability allows authenticated Splunk users with the 'change_authentication' capability to send multiple LDAP bind requests to a specific int...

Oct 1, 2025
CVE-2025-20371 7.5

This vulnerability allows unauthenticated attackers to perform blind server-side request forgery (SSRF) against vulnerable Splunk deployments, potenti...

Oct 1, 2025
CVE-2025-20366 6.5

A low-privileged user in Splunk Enterprise or Splunk Cloud Platform can access sensitive search results by guessing the unique Search ID (SID) of admi...

Oct 1, 2025
CVE-2025-20367 5.7

This is a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform that allows low-privileged users to inject malicious...

Oct 1, 2025
CVE-2025-20368 5.7

This CVE describes a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform where low-privileged users can inject mal...

Oct 1, 2025
CVE-2025-20322 4.3

This CSRF vulnerability in Splunk Enterprise and Cloud Platform allows unauthenticated attackers to trigger rolling restarts in Search Head Clusters b...

Jul 7, 2025
CVE-2025-20324 5.4

This vulnerability allows low-privileged Splunk users without admin or power roles to create or overwrite system source type configurations via a craf...

Jul 7, 2025
CVE-2025-20300 4.3

In affected Splunk Enterprise and Cloud Platform versions, a low-privileged user with read-only access to a specific alert can suppress that alert whe...

Jul 7, 2025
CVE-2025-20320 6.3

A path traversal vulnerability in Splunk Enterprise and Cloud Platform allows low-privileged users to delete arbitrary files via a malicious payload o...

Jul 7, 2025
CVE-2025-20298 8.0

This vulnerability allows non-administrator users on Windows systems to access the Splunk Universal Forwarder installation directory and all its conte...

Jun 2, 2025
CVE-2025-20230 4.3

This CVE allows low-privileged Splunk users without admin or power roles to edit and delete other users' data in App Key Value Store (KVStore) collect...

Mar 26, 2025
CVE-2025-20231 7.1

This vulnerability allows low-privileged Splunk users to run searches with higher-privileged user permissions through a phishing attack, potentially e...

Mar 26, 2025
CVE-2025-20232 5.7

This CVE describes a privilege escalation vulnerability in Splunk Enterprise and Cloud Platform where low-privileged users can bypass SPL safeguards f...

Mar 26, 2025
CVE-2025-20226 5.7

This vulnerability allows low-privileged Splunk users to bypass SPL safeguards for risky commands by tricking higher-privileged users into executing m...

Mar 26, 2025
CVE-2025-20228 6.5

A Cross-Site Request Forgery (CSRF) vulnerability in Splunk Enterprise and Splunk Cloud Platform allows low-privileged users without admin or power ro...

Mar 26, 2025
CVE-2025-20229 8.0

This vulnerability allows low-privileged Splunk users without admin or power roles to execute arbitrary code on the server by uploading files to a spe...

Mar 26, 2025
CVE-2024-53244 5.7

This vulnerability allows low-privileged Splunk users to bypass command safeguards by tricking higher-privileged users into executing saved searches c...

Dec 10, 2024
CVE-2024-53246 5.3

This CVE describes an information disclosure vulnerability in Splunk Enterprise and Splunk Cloud Platform where SPL commands can potentially expose se...

Dec 10, 2024
CVE-2024-45741 5.4

This CVE describes a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform where low-privileged users can create mal...

Oct 14, 2024
CVE-2024-45735 4.3

This vulnerability allows low-privileged users without admin or power roles to view App Key Value Store (KV Store) deployment configuration and public...

Oct 14, 2024
CVE-2024-45737 4.3

This CSRF vulnerability allows low-privileged Splunk users without admin or power roles to change the maintenance mode state of the App Key Value Stor...

Oct 14, 2024
CVE-2024-45739 4.9

Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 may log plaintext passwords for local native authentication users when the AdminManager log c...

Oct 14, 2024
CVE-2024-45731 8.0

This vulnerability allows low-privileged Splunk users without admin or power roles to write files to the Windows system root directory (typically Syst...

Oct 14, 2024
CVE-2024-45733 8.8

In Splunk Enterprise for Windows, low-privileged users without admin or power roles can achieve remote code execution due to insecure session storage....

Oct 14, 2024
CVE-2024-36997 8.1

This vulnerability allows an admin user in Splunk Enterprise and Splunk Cloud Platform to store and execute arbitrary JavaScript code in other users' ...

Jul 1, 2024
CVE-2024-36993 5.4

This CVE describes a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform where low-privileged users can inject mal...

Jul 1, 2024
CVE-2024-36995 5.4

This CVE allows low-privileged users without admin or power roles to create experimental items in Splunk Enterprise and Splunk Cloud Platform. This vi...

Jul 1, 2024
CVE-2024-36987 4.3

This vulnerability allows authenticated low-privileged users in Splunk Enterprise and Splunk Cloud Platform to upload files with arbitrary extensions ...

Jul 1, 2024
CVE-2024-36989 7.1

This CVE allows low-privileged users without admin or power roles to create notifications in Splunk Web Bulletin Messages that are broadcast to all us...

Jul 1, 2024
CVE-2024-36991 7.5

This vulnerability allows attackers to perform path traversal attacks on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This could ...

Jul 1, 2024
CVE-2024-36983 8.0

This vulnerability allows authenticated users in Splunk Enterprise and Cloud Platform to create external lookups that call legacy internal functions, ...

Jul 1, 2024
CVE-2024-36985 8.8

This vulnerability allows low-privileged Splunk users without admin or power roles to execute arbitrary code through external lookups referencing the ...

Jul 1, 2024
CVE-2024-29945 7.2

Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9 may expose authentication tokens during validation when debug logging is enabled. This allows...

Mar 27, 2024
CVE-2023-46230 8.2

Splunk Add-on Builder versions below 4.1.4 write sensitive information like credentials and API keys to internal log files. This vulnerability allows ...

Jan 30, 2024
CVE-2024-23678 7.5

This vulnerability in Splunk Enterprise for Windows allows unsafe deserialization of untrusted data from separate disk partitions due to improper path...

Jan 22, 2024
CVE-2023-46214 8.0

This vulnerability allows remote code execution on Splunk Enterprise instances by uploading malicious XSLT files. Attackers can execute arbitrary code...

Nov 16, 2023
CVE-2023-40595 8.8

This vulnerability in Splunk Enterprise allows attackers to execute arbitrary code by crafting malicious queries that exploit insecure deserialization...

Aug 30, 2023

Why Monitor Splunk Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 82+ known vulnerabilities affecting Splunk products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Splunk packages in under 60 seconds. No agents required - completely agentless scanning that works across Splunk deployments.

Free vulnerability database: Access detailed information about every Splunk CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Splunk CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Splunk CVEs Free