Sensitive Information Disclosure in MongoClient logging channel in Splunk Enterprise
Advisory ID: SVD-2026-0304
CVE ID: CVE-2026-20165
Published: 2026-03-11
Last Update: 2026-03-11
CVSSv3.1 Score: 6.3, Medium
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CWE: CWE-532
Bug ID: VULN-57362
Description
In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold the “admin” or “power” Splunk roles could retrieve sensitive information by inspecting the job’s search log due to improper access control in the MongoClient logging channel.
Solution
Upgrade Splunk Enterprise to versions 10.2.1, 10.0.4, 9.4.9, 9.3.10, or higher.
Splunk is actively monitoring and patching Splunk Cloud Platform instances.
Product Status
| Product | Base Version | Component | Affected Version | Fix Version |
|---|---|---|---|---|
| Splunk Enterprise | 10.2 | Splunk Web | 10.2.0 | 10.2.1 |
| Splunk Enterprise | 10.0 | Splunk Web | 10.0.0 to 10.0.3 | 10.0.4 |
| Splunk Enterprise | 9.4 | Splunk Web | 9.4.0 to 9.4.8 | 9.4.9 |
| Splunk Enterprise | 9.3 | Splunk Web | 9.3.0 to 9.3.9 | 9.3.10 |
| Splunk Cloud Platform | 10.2.2510 | Splunk Web | Below 10.2.2510.7 | 10.2.2510.7 |
| Splunk Cloud Platform | 10.1.2507 | Splunk Web | Below 10.1.2507.17 | 10.1.2507.17 |
| Splunk Cloud Platform | 10.0.2503 | Splunk Web | Below 10.0.2503.12 | 10.0.2503.12 |
| Splunk Cloud Platform | 9.3.2411 | Splunk Web | Below 9.3.2411.124 | 9.3.2411.124 |
Mitigations and Workarounds
The vulnerability affects instances with Splunk Web turned on, turning Splunk Web off is a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on turning off Splunk Web.
Detections
None
Severity
Splunk rates this vulnerability a 6.3, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L.
Acknowledgments
John Copeland