CVE-2025-20371
Splunk Enterprise vulnerability analysis and mitigation

Overview

CVE-2025-20371 is a high-severity vulnerability affecting Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122. The vulnerability was discovered and disclosed on October 1, 2025. This security flaw allows an unauthenticated attacker to trigger a blind server-side request forgery (SSRF), which could potentially enable the attacker to perform REST API calls on behalf of an authenticated high-privileged user (Splunk Advisory, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. The flaw specifically affects the REST API component of Splunk Enterprise and Splunk Cloud Platform. For successful exploitation, the enableSplunkWebClientNetloc setting in the web.conf configuration file must be set to true, and the attack typically requires user interaction through phishing (Splunk Advisory).

Impact

If successfully exploited, the vulnerability allows attackers to perform REST API calls with the privileges of an authenticated high-privileged user. This could potentially lead to unauthorized access to sensitive data and system functions, as the attacker would be able to execute actions with elevated permissions (GBHackers, Splunk Advisory).

Mitigation and workarounds

Splunk has released patched versions to address this vulnerability. Organizations should upgrade Splunk Enterprise to versions 10.0.1, 9.4.4, 9.3.6, 9.2.8, or higher. For Splunk Cloud Platform, Splunk is actively monitoring and patching instances automatically. As a workaround, administrators can mitigate the vulnerability by setting enableSplunkWebClientNetloc to false in the web.conf configuration file (Splunk Advisory).

Community reactions

The vulnerability has garnered attention in the cybersecurity community as part of a larger security update addressing multiple flaws in Splunk Enterprise. Security researchers and industry professionals have highlighted this as one of the most severe vulnerabilities in the update, particularly due to its potential impact on privileged user access (GBHackers).

Additional resources


SourceThis report was generated using AI

Related Splunk Enterprise vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20371HIGH8.8
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
NoYesOct 01, 2025
CVE-2025-20369MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesOct 01, 2025
CVE-2025-20368MEDIUM5.4
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesOct 01, 2025
CVE-2025-20367MEDIUM5.4
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesOct 01, 2025
CVE-2025-20370MEDIUM4.9
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesOct 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management