In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through the error messages and job inspection details of a saved search. This could result in execution of unauthorized JavaScript code in the browser of a user.
2025-10-01T17:15:39.893
2025-10-08T20:22:57.043
Analyzed
CVSSv3.1: 5.7 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | splunk | splunk | < 9.2.8 | Yes |
| Application | splunk | splunk | < 9.3.6 | Yes |
| Application | splunk | splunk | < 9.4.4 | Yes |
| Application | splunk | splunk_cloud_platform | < 9.2.2406.123 | Yes |
| Application | splunk | splunk_cloud_platform | < 9.3.2408.118 | Yes |
| Application | splunk | splunk_cloud_platform | < 9.3.2411.108 | Yes |