Extensible Markup Language (XML) External Entity Injection (XXE) through Dashboard label field on Splunk Enterprise

Advisory ID: SVD-2025-1004

CVE ID: CVE-2025-20369

Published: 2025-10-01

Last Update: 2025-10-01

CVSSv3.1 Score: 4.6, Medium

CWE: CWE-776

Bug ID: VULN-13293

Description

In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the ‘admin’ or ‘power’ Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.

Solution

Upgrade Splunk Enterprise to versions 9.4.4, 9.3.6, 9.2.8 or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductBase VersionComponentAffected VersionFix Version
Splunk Enterprise10.0Splunk WebNot Affected10.0.0
Splunk Enterprise9.4Splunk Web9.4.0 to 9.4.39.4.4
Splunk Enterprise9.3Splunk Web9.3.0 to 9.3.59.3.6
Splunk Enterprise9.2Splunk Web9.2.0 to 9.2.79.2.8
Splunk Cloud Platform9.3.2411Splunk WebBelow 9.3.2411.1089.3.2411.108
Splunk Cloud Platform9.3.2408Splunk WebBelow 9.3.2408.1189.3.2408.118
Splunk Cloud Platform9.2.2406Splunk WebBelow 9.2.2406.1239.2.2406.123

Mitigations and Workarounds

The vulnerability affects instances with Splunk Web enabled, turning Splunk Web off is a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on disabling Splunk Web.

Detections

None

Severity

Splunk rates this vulnerability a 4.6, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L.

Acknowledgments

Eric LaMothe, Splunk