Reflected Cross-Site Scripting via the radio template in Splunk Enterprise

Advisory ID: SVD-2022-1108

CVE ID: CVE-2022-43568

Published: 2022-11-02

Last Update: 2022-11-02

CVSSv3.1 Score: 8.8, High, High


Bug ID: SPL-228379


In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.


For Splunk Enterprise, upgrade versions to 8.1.12, 8.2.9, 9.0.2, or higher.

For Splunk Cloud Platform, Splunk is actively patching and monitoring the Splunk Cloud instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise8.1Splunk Web8.1.11 and lower8.1.12
Splunk Enterprise8.2Splunk Web8.2.0 to
Splunk Enterprise9.0Splunk Web9.0.0 to
Splunk Cloud PlatformSplunk Web9.0.2203.4 and lower9.0.2205

Mitigations and Workarounds

The vulnerability affects instances with Splunk Web enabled, disabling Splunk Web is a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on disabling Splunk Web.


Splunk versions 8.1.0, 8.2.0, and 9.0.0 are vulnerable to reflected cross site scripting (XSS) exploitation leading to Local File Inclusion (LFI) in the Splunk Assist application. This detection search provides information on exploitation attempts.


Splunk rates the vulnerability as High, 8.8, with a CVSS Vectors of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability requires user interaction within a browser. If the Splunk Enterprise instance does not run Splunk Web, there is no impact and the severity is Informational.


Danylo Dmytriiev (DDV_UA)