Third-Party Package Updates in Splunk SOAR - July 2025

Advisory ID: SVD-2025-0712

CVE ID:  Multiple

Published: 2025-07-07

Last Update: 2025-07-07

Description

Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in Splunk SOAR versions 6.4.0 and 6.4.1 including the following:

PackageRemediationCVESeverity
gitUpgrade to v2.48.1CVE-2024-32002Critical
@babel/runtimeUpgraded to v7.26.10CVE-2025-27789Medium
djangoUpgraded to v4.2.20 in Automation BrokerCVE-2024-45230High
cryptographyUpgraded to v44.0.1CVE-2024-12797Medium
pyOpenSSLUpgraded to v24.3.0CVE-2024-12797Medium
jquery.datatables1Upgraded to v1.13.11MultipleHigh
DomPurify2Upgraded to v3.2.4MultipleHigh
wkhtmlRemoved the wkhtml in Automation BrokerCVE-2022-35583High
cross-spawnUpgraded to v7.0.6CVE-2024-21538High
@babel/traverse3Upgraded to v7.26.7CVE-2024-48949Critical
setuptoolsUpgraded to v75.5.0 in v6.4.0 and Upgraded to v78.1.0 in Splunk SOAR v6.4.1CVE-2024-6345High
axiosUpgraded to v1.7.9 in 6.4.0 and Upgraded to 1.8.3 in 6.4.1CVE-2024-39338High
jinjaUpgraded to v3.1.4CVE-2024-34064Medium
tornadoUpgraded to v6.4.2CVE-2024-52804High
avahi-daemon4Enable-wide-area is set to 'no' in the '/etc/avahi/avahi-daemon.conf' in Automation BrokerCVE-2024-52616Medium
werkzeugUpgraded to v3.0.6CVE-2024-49767High

1 Upgraded jQuery Datatables from v1.10.21 to v1.13.11 to remedy CVE-2020-28458, CVE-2021-23445

2 Upgraded Dompurify from v3.0.1 to v3.2.4 to remedy CVE-2024-45801, CVE-2024-47875

3 The babel/traverse is removed in Splunk SOAR v6.4.1

4 The flag ‘enable-wide-area’ is set to ‘no’ in /etc/avahi/avahi-daemon.conf.

Solution

Upgrade Splunk SOAR to version 6.4.1 or higher.

Product Status

ProductBase VersionAffected VersionFix Version
Splunk SOAR6.4Below 6.4.16.4.1

Severity

For the CVEs in this list, Splunk adopted the vendor’s severity rating or the National Vulnerability Database (NVD) common vulnerability scoring system (CVSS) rating, as available.