CVE Vulnerabilities

CVE-2025-20388

Server-Side Request Forgery (SSRF)

Published: Dec 03, 2025 | Modified: Dec 05, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability change_authentication could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

NameVendorStart VersionEnd Version
SplunkSplunk9.2.0 (including)9.2.10 (excluding)
SplunkSplunk9.3.0 (including)9.3.8 (excluding)
SplunkSplunk9.4.0 (including)9.4.6 (excluding)
SplunkSplunk10.0.0 (including)10.0.0 (including)
Splunk_cloud_platformSplunk9.3.2411 (including)9.3.2411.116 (excluding)
Splunk_cloud_platformSplunk10.0.2503 (including)10.0.2503.6 (excluding)
Splunk_cloud_platformSplunk10.1.2507 (including)10.1.2507.4 (excluding)

References