Unrated severityNVD Advisory· Published Jul 7, 2025· Updated Jul 8, 2025
Improper Access Control Lets Low-Privilege Users Suppress Read-Only Alerts in Splunk Enterprise
CVE-2025-20300
Description
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles, and has read-only access to a specific alert, could suppress that alert when it triggers. See Define alert suppression groups to throttle sets of similar alerts.
Affected products
4- Range: <9.3.2411.103 || <9.3.2408.112 || <9.2.2406.119
- Range: <9.4.2 || <9.3.5 || <9.2.6 || <9.1.9
- Splunk/Splunk Cloud Platformv5Range: 9.3.2411
- Splunk/Splunk Enterprisev5Range: 9.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.