In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.111, 9.3.2408.119, and 9.2.2406.122, a low-privileged user that does not hold the admin or power Splunk roles could access sensitive search results if Splunk Enterprise runs an administrative search job in the background. If the low privileged user guesses the search job’s unique Search ID (SID), the user could retrieve the results of that job, potentially exposing sensitive search results. For more information see https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/about-jobs-and-job-management and https://help.splunk.com/en/splunk-enterprise/search/search-manual/10.0/manage-jobs/manage-search-jobs.
References
| Link | Resource |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1001 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Oct 2025, 20:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Splunk
Splunk splunk Cloud Platform Splunk splunk |
|
| References | () https://advisory.splunk.com/advisories/SVD-2025-1001 - Vendor Advisory | |
| CPE | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* |
01 Oct 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 17:15
Updated : 2025-10-08 20:36
NVD link : CVE-2025-20366
Mitre link : CVE-2025-20366
CVE.ORG link : CVE-2025-20366
JSON object : View
Products Affected
splunk
- splunk_cloud_platform
- splunk
CWE
CWE-284
Improper Access Control
