CVE-2025-20369
01.10.2025, 17:15
In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.
| Vendor | Product | Version |
|---|---|---|
| splunk | splunk | 9.2.0 ≤ 𝑥 < 9.2.8 |
| splunk | splunk | 9.3.0 ≤ 𝑥 < 9.3.6 |
| splunk | splunk | 9.4.0 ≤ 𝑥 < 9.4.4 |
| splunk | splunk_cloud_platform | 9.2.2406 ≤ 𝑥 < 9.2.2406.123 |
| splunk | splunk_cloud_platform | 9.3.2408 ≤ 𝑥 < 9.3.2408.118 |
| splunk | splunk_cloud_platform | 9.3.2411 ≤ 𝑥 < 9.3.2411.108 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-776 - Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')The software uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
- CWE-611 - Improper Restriction of XML External Entity ReferenceThe software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.