fkie_cve-2025-20227
Vulnerability from fkie_nvd
Published
2025-03-26 22:15
Modified
2025-07-21 20:51
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could bypass the external content warning modal dialog box in Dashboard Studio dashboards which could lead to an information disclosure.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://advisory.splunk.com/advisories/SVD-2025-0306 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
splunk | splunk | * | |
splunk | splunk | * | |
splunk | splunk | * | |
splunk | splunk | 9.4.0 | |
splunk | splunk_cloud_platform | * | |
splunk | splunk_cloud_platform | * | |
splunk | splunk_cloud_platform | * | |
splunk | splunk_cloud_platform | * | |
splunk | splunk_cloud_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "49EE75F0-2AD6-4712-9E2A-C000A44E5605", "versionEndExcluding": "9.1.8", "versionStartIncluding": "9.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E31DE8DF-1AAD-4570-93E3-711C07FE1227", "versionEndExcluding": "9.2.4", "versionStartIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E66E66BA-AFC2-4E0A-B233-9E2C7D985AF0", "versionEndExcluding": "9.3.3", "versionStartIncluding": "9.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk:9.4.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AD39F156-52DB-4F43-8528-37500E3AEB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E95F34F-276A-4B6C-B317-DB58839B34CE", "versionEndExcluding": "9.1.2308.214", "versionStartIncluding": "9.1.2308", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE9FAFD0-7787-425C-81D9-705E99B53E6A", "versionEndExcluding": "9.1.2312.208", "versionStartIncluding": "9.1.2312", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79896AF-1111-47AE-A84E-9D897BF2031C", "versionEndExcluding": "9.2.2403.115", "versionStartIncluding": "9.2.2403", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "000487DA-0E58-4953-A4BD-BEF09D825246", "versionEndExcluding": "9.2.2406.113", "versionStartIncluding": "9.2.2406.100", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0D477D5-C135-4D18-BC7D-94D4A5F34E1D", "versionEndExcluding": "9.3.2408.107", "versionStartIncluding": "9.3.2408.100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could bypass the external content warning modal dialog box in Dashboard Studio dashboards which could lead to an information disclosure." }, { "lang": "es", "value": "En las versiones de Splunk Enterprise anteriores a 9.4.1, 9.3.3, 9.2.5 y 9.1.8, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 y 9.1.2308.214, un usuario con pocos privilegios que no tenga los roles de \"admin\" o \"power\" de Splunk podr\u00eda omitir el cuadro de di\u00e1logo modal de advertencia de contenido externo en los paneles de Dashboard Studio, lo que podr\u00eda provocar una divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2025-20227", "lastModified": "2025-07-21T20:51:45.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-26T22:15:14.637", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://advisory.splunk.com/advisories/SVD-2025-0306" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…