
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-20371 is a high-severity vulnerability affecting Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122. The vulnerability was discovered and disclosed on October 1, 2025. This security flaw allows an unauthenticated attacker to trigger a blind server-side request forgery (SSRF), which could potentially enable the attacker to perform REST API calls on behalf of an authenticated high-privileged user (Splunk Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. The flaw specifically affects the REST API component of Splunk Enterprise and Splunk Cloud Platform. For successful exploitation, the enableSplunkWebClientNetloc setting in the web.conf configuration file must be set to true, and the attack typically requires user interaction through phishing (Splunk Advisory).
If successfully exploited, the vulnerability allows attackers to perform REST API calls with the privileges of an authenticated high-privileged user. This could potentially lead to unauthorized access to sensitive data and system functions, as the attacker would be able to execute actions with elevated permissions (GBHackers, Splunk Advisory).
Splunk has released patched versions to address this vulnerability. Organizations should upgrade Splunk Enterprise to versions 10.0.1, 9.4.4, 9.3.6, 9.2.8, or higher. For Splunk Cloud Platform, Splunk is actively monitoring and patching instances automatically. As a workaround, administrators can mitigate the vulnerability by setting enableSplunkWebClientNetloc to false in the web.conf configuration file (Splunk Advisory).
The vulnerability has garnered attention in the cybersecurity community as part of a larger security update addressing multiple flaws in Splunk Enterprise. Security researchers and industry professionals have highlighted this as one of the most severe vulnerabilities in the update, particularly due to its potential impact on privileged user access (GBHackers).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."