Unauthenticated Blind Server Side Request Forgery (SSRF) in Splunk Enterprise

Advisory ID: SVD-2025-1006

CVE ID: CVE-2025-20371

Published: 2025-10-01

Last Update: 2025-10-01

CVSSv3.1 Score: 7.5, High

CWE: CWE-918

Bug ID: VULN-30005

Description

In Splunk Enterprise versions below 10.0.1, 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119, and 9.2.2406.122, an unauthenticated attacker could trigger a blind server-side request forgery (SSRF), potentially letting an attacker perform REST API calls on behalf of an authenticated high-privileged user.

To be successful, the attack requires the enableSplunkWebClientNetloc setting in the web.confconfiguration file to have a value of true. Additionally, the attacker likely has to phish the victim by tricking them into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.

See the web.conf configuration specification file for more information on the configuration settings.

Solution

Upgrade Splunk Enterprise to versions 10.0.1, 9.4.4, 9.3.6, 9.2.8, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductBase VersionComponentAffected VersionFix Version
Splunk Enterprise10.0REST API10.0.010.0.1
Splunk Enterprise9.4REST API9.4.0 to 9.4.39.4.4
Splunk Enterprise9.3REST API9.3.0 to 9.3.59.3.6
Splunk Enterprise9.2REST API9.2.0 to 9.2.79.2.8
Splunk Cloud Platform9.3.2411REST APIBelow 9.3.2411.1099.3.2411.109
Splunk Cloud Platform9.3.2408REST APIBelow 9.3.2408.1199.3.2408.119
Splunk Cloud Platform9.2.2406REST APIBelow 9.2.2406.1229.2.2406.122

Mitigations and Workarounds

To be successful, the attack requires the enableSplunkWebClientNetloc setting in the web.confconfiguration file to have a value of true. An admin can turn the setting off on a Splunk Enterprise instance to mitigate the vulnerability by giving it a value of false.

See the web.conf configuration specification file for more information on the configuration settings.

Detections

None

Severity

Splunk rates this vulnerability a 7.5, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H.
If the enableSplunkWebClientNetloc setting has a value of false in the web.conf configuration file for Splunk Enterprise, there should be no impact and the severity would be Informational.

Acknowledgments

Alex Hordijk (hordalex)