CVE-2026-20202
EUVD-2026-2293015.04.2026, 16:16
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users.Enginsight
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| splunk | splunk | 10.2 ≤ 𝑥 < 10.2.2 | CNA |
| splunk | splunk | 10.0 ≤ 𝑥 < 10.0.5 | CNA |
| splunk | splunk | 9.4 ≤ 𝑥 < 9.4.10 | CNA |
| splunk | splunk | 9.3 ≤ 𝑥 < 9.3.11 | CNA |
| splunk | splunk | 10.3.2512 ≤ 𝑥 < 10.3.2512.6 | CNA |
| splunk | splunk | 10.2.2510 ≤ 𝑥 < 10.2.2510.10 | CNA |
| splunk | splunk | 10.1.2507 ≤ 𝑥 < 10.1.2507.20 | CNA |
| splunk | splunk | 10.0.2503 ≤ 𝑥 < 10.0.2503.13 | CNA |
| splunk | splunk | 9.3.2411 ≤ 𝑥 < 9.3.2411.127 | CNA |
Common Weakness Enumeration