CVE-2024-36997
Splunk Enterprise vulnerability analysis and mitigation

Overview

A persistent cross-site scripting (XSS) vulnerability was discovered in Splunk Enterprise and Splunk Cloud Platform, identified as CVE-2024-36997. The vulnerability affects Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, and Splunk Cloud Platform versions below 9.1.2312. This security issue was disclosed on July 1, 2024, and received a CVSS v3.1 score of 8.1 (HIGH) (Vendor Advisory).

Technical details

The vulnerability allows an admin user to store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. The vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The attack vector is network-based with low attack complexity, requiring high privileges and user interaction, as indicated by the CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (Vendor Advisory).

Impact

The vulnerability can lead to persistent cross-site scripting attacks where malicious JavaScript code can be executed in the browser context of other Splunk users. This could potentially result in unauthorized access to sensitive information and compromise of user sessions. The impact is particularly severe as it affects the confidentiality and integrity of data, though availability is not impacted (Vendor Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade Splunk Enterprise to versions 9.2.2, 9.1.5, or 9.0.10 or higher. For Splunk Cloud Platform, Splunk is performing upgrades as part of Routine Maintenance. As a workaround, organizations can disable Splunk Web if it's not essential to operations. Splunk is actively monitoring for potential exploitation of this vulnerability (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related Splunk Enterprise vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20389MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20387MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20386MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20385MEDIUM4.8
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025
CVE-2025-20388LOW2.7
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management