VYPR
Medium severity4.8NVD Advisory· Published May 12, 2017· Updated May 13, 2026

CVE-2016-4856

CVE-2016-4856

Description

Cross-site scripting vulnerability in Splunk Enterprise 6.3.x prior to 6.3.5 and Splunk Light 6.3.x prior to 6.3.5 allows attacker with administrator rights to inject arbitrary web script or HTML via unspecified vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored cross-site scripting vulnerability in Splunk Enterprise and Splunk Light 6.3.x prior to 6.3.5 allows admin-level attackers to execute arbitrary scripts.

Vulnerability

Stored cross-site scripting (XSS) vulnerability in Splunk Web component of Splunk Enterprise and Splunk Light versions 6.3.x prior to 6.3.5 [1][2]. The vulnerability allows an attacker with administrator privileges to inject arbitrary web script or HTML via unspecified vectors [1]. This is a stored XSS (CWE-79) [1].

Exploitation

An attacker must have administrator-level access to the Splunk instance [1]. The attacker can inject malicious script through unspecified vectors in the Splunk Web interface. The script is stored and later executed in the browser of other users who view the affected page [1]. No user interaction beyond viewing the page is required for the victim.

Impact

Successful exploitation leads to execution of arbitrary script in the victim's browser within the context of the Splunk Web application [1]. This can result in disclosure of sensitive information, session hijacking, or other actions as the victim user. The CVSS v3 vector is AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating low confidentiality and integrity impact but with scope change [1].

Mitigation

Upgrade to Splunk Enterprise 6.3.5 or later, or Splunk Light 6.3.5 or later [1][2]. These versions were released on 2016-06-06 [2]. Splunk also recommends applying hardening standards from the Securing Splunk documentation [2]. No workaround is provided; upgrading is the only solution.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4
  • Range: >=6.3.0, <6.3.5
  • Range: >=6.3.0, <6.3.5
  • Splunk Inc./Splunk Enterprisev5
    Range: 6.3.x prior to 6.3.5
  • Splunk Inc./Splunk Lightv5
    Range: 6.3.x prior to 6.3.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.