Remote Code Execution through file upload to “$SPLUNK_HOME/var/run/splunk/apptemp“ directory in Splunk Enterprise
Advisory ID: SVD-2025-0301
CVE ID: CVE-2025-20229
Published: 2025-03-26
Last Update: 2025-03-26
CVSSv3.1 Score: 8.0, High
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE: CWE-284
Bug ID: VULN-19218
Description
In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the “admin” or “power” Splunk roles could perform a Remote Code Execution (RCE) through a file upload to the “$SPLUNK_HOME/var/run/splunk/apptemp” directory due to missing authorization checks.
Solution
Upgrade Splunk Enterprise to versions 9.4.0, 9.3.3, 9.2.5, 9.1.8, or higher.
Splunk is actively monitoring and patching Splunk Cloud Platform instances.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Splunk Enterprise | 9.4 | 9.4.0 | ||
Splunk Enterprise | 9.3 | 9.3.0 to 9.3.2 | 9.3.3 | |
Splunk Enterprise | 9.2 | 9.2.0 to 9.2.4 | 9.2.5 | |
Splunk Enterprise | 9.1 | 9.1.0 to 9.1.7 | 9.1.8 | |
Splunk Cloud Platform | 9.3.2408 | Splunk Web | 9.3.2408.100 to 9.3.2408.103 | 9.3.2408.104 |
Splunk Cloud Platform | 9.2.2406 | Splunk Web | 9.2.2406.100 to 9.2.2406.107 | 9.2.2406.108 |
Splunk Cloud Platform | 9.2.2403 | Splunk Web | Below 9.2.2403.113 | 9.2.2403.114 |
Splunk Cloud Platform | 9.1.2312 | Splunk Web | Below 9.1.2312.207 | 9.1.2312.208 |
Mitigations and Workarounds
None
Detections
None
Severity
Splunk rates this vulnerability as a 8.0, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H.
Acknowledgments
Alex Hordijk (hordalex)