Unrated severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025
Improper access control through push notifications for reports and alerts in Splunk Secure Gateway app
CVE-2025-20383
Description
In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and below 3.9.10, 3.8.58, and 3.7.28 of Splunk Secure Gateway app in Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles and subscribes to mobile push notifications could receive notifications that disclose the title and description of the report or alert even if they do not have access to view the report or alert.
Affected products
5- Range: < 3.9.10, 3.8.58, 3.7.28
- Range: < 10.0.2, 9.4.6, 9.3.8, 9.2.10
- Splunk/Splunk Cloud Platformv5Range: 10.1.2507
- Splunk/Splunk Enterprisev5Range: 10.0
- Splunk/Splunk Secure Gatewayv5Range: 3.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.