CVE-2023-22931
Splunk Forwarder vulnerability analysis and mitigation

Overview

CVE-2023-22931 affects Splunk Enterprise versions below 8.1.13 and 8.2.10, where the 'createrss' external search command has a vulnerability that allows overwriting existing Resource Description Format Site Summary (RSS) feeds without proper permission verification. The vulnerability was discovered and disclosed on February 14, 2023. The affected systems include Splunk Enterprise versions 8.1.0-8.1.12, 8.2.0-8.2.9, and Splunk Cloud Platform versions up to 8.2.2202 (Splunk Advisory).

Technical details

The vulnerability has been assigned a CVSSv3.1 base score of 4.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The issue is related to improper authorization (CWE-285) and incorrect default permissions (CWE-276). The vulnerability specifically involves the 'createrss' external search command, which has been deprecated and disabled by default due to its security implications (Splunk Advisory).

Impact

The vulnerability allows attackers to overwrite existing RSS feeds without proper permission verification, potentially leading to unauthorized modification of RSS feed content. The impact is primarily limited to integrity concerns, as indicated by the CVSS metrics showing impact only on integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact (Splunk Advisory).

Mitigation and workarounds

For Splunk Enterprise users, the recommended solution is to upgrade to versions 8.1.13, 8.2.10, or higher. For Splunk Cloud Platform users, Splunk has actively patched and monitored the affected Cloud instances, with the fix version being 8.2.2203. No alternative mitigations or workarounds are provided (Splunk Advisory).

Additional resources


SourceThis report was generated using AI

Related Splunk Forwarder vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20298HIGH8
  • Splunk ForwarderSplunk Forwarder
  • cpe:2.3:a:splunk:universal_forwarder
NoYesJun 02, 2025
CVE-2023-27537MEDIUM5.9
  • MySQLMySQL
  • libcurl-minimal-debuginfo
NoYesMar 30, 2023
CVE-2023-27536MEDIUM5.9
  • MySQLMySQL
  • curl-debuginfo
NoYesMar 30, 2023
CVE-2023-27535MEDIUM5.9
  • MySQLMySQL
  • mysql
NoYesMar 30, 2023
CVE-2023-27538MEDIUM5.5
  • MySQLMySQL
  • libcurl-minimal
NoYesMar 30, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management