VYPR
Unrated severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025

Unauthenticated Log Injection in Splunk Enterprise

CVE-2025-20384

Description

In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.

Affected products

4
  • Range: < 10.1.2507.4, 10.0.2503.6, 9.3.2411.117.125
  • Range: < 10.1.2507.4, 10.0.2503.6, 9.3.2411.117.125
  • Splunk/Splunk Cloud Platformv5
    Range: 10.1.2507
  • Splunk/Splunk Enterprisev5
    Range: 10.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.