VYPR
Unrated severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025

Improper access control through push notifications for reports and alerts in Splunk Secure Gateway app

CVE-2025-20383

Description

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and below 3.9.10, 3.8.58, and 3.7.28 of Splunk Secure Gateway app in Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles and subscribes to mobile push notifications could receive notifications that disclose the title and description of the report or alert even if they do not have access to view the report or alert.

Affected products

5
  • Range: < 3.9.10, 3.8.58, 3.7.28
  • Range: < 10.0.2, 9.4.6, 9.3.8, 9.2.10
  • Splunk/Splunk Cloud Platformv5
    Range: 10.1.2507
  • Splunk/Splunk Enterprisev5
    Range: 10.0
  • Splunk/Splunk Secure Gatewayv5
    Range: 3.9

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.