Unrated severityNVD Advisory· Published Jul 7, 2025· Updated Feb 26, 2026
Remote Command Execution through Scripted Input Files in Splunk Enterprise
CVE-2025-20319
Description
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability edit_scripted and list_inputs capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.See Define roles on the Splunk platform with capabilities and Setting up a scripted input for more information.
Affected products
2- Range: <9.1.10, >=9.2.0 <9.2.7, >=9.3.0 <9.3.5, >=9.4.0 <9.4.3
- Splunk/Splunk Enterprisev5Range: 9.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.