Unrated severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025
Blind Server Side Request Forgery (SSRF) through Distributed Search Peers in Splunk Enterprise
CVE-2025-20388
Description
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability change_authentication could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.
Affected products
4- Range: <=10.1.2507.4, <=10.0.2503.7, <=9.3.2411.116
- Range: <=10.0.1, <=9.4.6, <=9.3.8, <=9.2.10
- Splunk/Splunk Cloud Platformv5Range: 10.1.2507
- Splunk/Splunk Enterprisev5Range: 10.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.