Sensitive Information Disclosure in ''_internal'' index in Splunk Enterprise

Advisory ID: SVD-2026-0209

CVE ID: CVE-2026-20144

Published: 2026-02-18

Last Update: 2026-02-18

CVSSv3.1 Score: 6.8, Medium

CWE: CWE-532

Bug ID: VULN-48743

Description

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Platform versions below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, and 9.3.2411.120, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk _internal index could view the Security Assertion Markup Language (SAML) configurations for “Attribute query requests” (AQRs) or “Authentication extensions” in plain text within the conf.log file, depending on which feature is configured.

For more information, see:

Solution

Upgrade Splunk Enterprise to versions 10.2.0, 10.0.2, 9.4.7, 9.3.8, 9.2.11, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductBase VersionComponentAffected VersionFix Version
Splunk Enterprise10.2splunkdNot affected10.2.0
Splunk Enterprise10.0splunkd10.0.0 to 10.0.110.0.2
Splunk Enterprise9.4splunkd9.4.0 to 9.4.69.4.7
Splunk Enterprise9.3splunkd9.3.0 to 9.3.79.3.8
Splunk Enterprise9.2splunkd9.2.0 to 9.2.109.2.11
Splunk Cloud Platform10.2.2510splunkdNot affected10.2.2510.0
Splunk Cloud Platform10.1.2507splunkdBelow 10.1.2507.1110.1.2507.11
Splunk Cloud Platform10.0.2503splunkdBelow 10.0.2503.910.0.2503.9
Splunk Cloud Platform9.3.2411splunkdBelow 9.3.2411.1209.3.2411.120

Mitigations and Workarounds

To eliminate further risk and help ensure a high level of security in your environment, you must perform the following recommended actions:

  • Change the password that is currently specified in your SAML “Attribute query requests” (AQR ) configuration 
  • Rotate all the sensitive key values in your SAML “Authentication extensions > Script secure arguments” configuration.  

You can access your SAML configuration by navigating to “Settings > Authentication methods > SAML - Configure Splunk to use SAML > SAML Config” in Splunk Web. See more information about configuring SAML AQR and SAML authentication extensions in the Splunk documentation: Configure authentication extensions to interface with your SAML identity provider.

Detections

None

Severity

Splunk rates this vulnerability a 6.8, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H.