VYPR
Unrated severityNVD Advisory· Published Jul 7, 2025· Updated Feb 26, 2026

Remote Command Execution through Scripted Input Files in Splunk Enterprise

CVE-2025-20319

Description

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability edit_scripted and list_inputs capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.See Define roles on the Splunk platform with capabilities and Setting up a scripted input for more information.

Affected products

2
  • Range: <9.1.10, >=9.2.0 <9.2.7, >=9.3.0 <9.3.5, >=9.4.0 <9.4.3
  • Splunk/Splunk Enterprisev5
    Range: 9.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.