CVE-2023-40598
Splunk Enterprise vulnerability analysis and mitigation

Overview

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, a command injection vulnerability (CVE-2023-40598) was discovered that allows attackers to execute arbitrary code on Splunk platform instances. The vulnerability was disclosed on August 30, 2023, and received a CVSS v3.1 base score of 8.8 (High) from NVD and 8.5 (High) from Splunk (NVD, Splunk Advisory).

Technical details

The vulnerability exploits a legacy internal function through external lookups. Specifically, it involves the deprecated runshellscript command used by scripted alert actions. An attacker can combine this command with external command lookups to inject and execute commands within a privileged context on the Splunk platform instance. The vulnerability has been assigned CWE-306 (Missing Authentication for Critical Function) and CWE-77 (Improper Neutralization of Special Elements used in a Command) (NVD, Splunk Advisory).

Impact

If successfully exploited, the vulnerability allows attackers to insert code into the Splunk platform installation directory and subsequently execute arbitrary code on the Splunk platform instance. This could lead to unauthorized access, system compromise, and potential data breaches (SecurityWeek).

Mitigation and workarounds

The primary mitigation is to upgrade Splunk Enterprise to versions 8.2.12, 9.0.6, or 9.1.1. For environments where immediate upgrading is not possible, Splunk recommends disabling Splunk Web on indexers in a distributed environment if users don't need to log in to Splunk Web on those indexers. This can be done by following the guidance in the Splunk documentation for disabling unnecessary Splunk Enterprise components (Splunk Advisory).

Additional resources


SourceThis report was generated using AI

Related Splunk Enterprise vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20389MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
NoYesDec 03, 2025
CVE-2025-20387MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20386MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20385MEDIUM4.8
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20388LOW2.7
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management