Unrated severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025
Unauthenticated Log Injection in Splunk Enterprise
CVE-2025-20384
Description
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.
Affected products
4- Range: < 10.1.2507.4, 10.0.2503.6, 9.3.2411.117.125
- Range: < 10.1.2507.4, 10.0.2503.6, 9.3.2411.117.125
- Splunk/Splunk Cloud Platformv5Range: 10.1.2507
- Splunk/Splunk Enterprisev5Range: 10.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.