[CIVN-2026-0136] Multiple Vulnerabilities in Splunk Enterprise Products

By Published On: March 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Splunk Enterprise Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


Splunk Enterprise versions prior to 10.2.1

Splunk Enterprise versions prior to 10.0.4

Splunk Enterprise versions prior to 9.4.9

Splunk Enterprise versions prior to 9.3.10

Splunk Cloud Platform versions prior to 10.2.2510.7

Splunk Cloud Platform versions prior to 10.1.2507.17

Splunk Cloud Platform versions prior to 10.0.2503.12

Splunk Cloud Platform versions prior to 9.3.2411.124

Overview


Multiple vulnerabilities have been reported in Splunk Enterprise product which could allow an attacker to execute arbitrary code, perform Cross-Site Scripting (XSS) attack or obtain sensitive information on the targeted system.


Target Audience:

All organizations and individuals using Splunk Enterprise products.


Risk Assessment:

Potential for unauthorized access to sensitive information, execution of arbitrary commands, and Stored Cross-Site Scripting (XSS).


Impact Assessment:

High risk of information disclosure, privilege misuse, and full system compromise.


Description


Splunk Enterprise is a data platform that enables organizations to collect, index, search, analyze, and visualize machine-generated data from any source.


Multiple vulnerabilities exist in Splunk products due to improper access control, insufficient input validation and sanitization, and improper handling of user-supplied input. An attacker could exploit these vulnerabilities by sending specially crafted requests or by tricking an authenticated user into performing certain actions.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, perform Cross-Site Scripting (XSS) attack or obtain sensitive information on the targeted system.


Solution


Apply appropriate fixes issued by the vendor:

https://advisory.splunk.com/advisories/SVD-2026-0301


https://advisory.splunk.com/advisories/SVD-2026-0302


https://advisory.splunk.com/advisories/SVD-2026-0303


https://advisory.splunk.com/advisories/SVD-2026-0304


https://advisory.splunk.com/advisories/SVD-2026-0305



Vendor Information


Splunk

https://www.splunk.com/


References


Splunk

https://advisory.splunk.com/advisories/SVD-2026-0301

https://advisory.splunk.com/advisories/SVD-2026-0302

https://advisory.splunk.com/advisories/SVD-2026-0303

https://advisory.splunk.com/advisories/SVD-2026-0304

https://advisory.splunk.com/advisories/SVD-2026-0305


CVE Name

CVE-2026-20162

CVE-2026-20163

CVE-2026-20164

CVE-2026-20165

CVE-2026-20166




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmm0MbcACgkQ3jCgcSdc

ys8EGA//fmU4m5GMnSxv3J4R67gUeBR7UnIGZKPV6gi+cL1tr0EgFYaPo9OBGaMq

ZWd7eeugebdTjLsz9fz2xsYWbrSgf1L8oCeuYkdyx7afHvMl7RWrk747s2YqQzUi

Rx1JOvZp9/opwxwoKNlgztgg9RZY3mJa5soAm+S1UIo1in9/PR4BCrKa/pCK5n+S

u0zchrybIIur2Q6/eqF4Wt4jtHNBkG2uVqiZIvmLgase9JywA5k/+W7Z75yv2UfY

CLjAsDS5vE9L4inb2g8TSoTytma7pBSjeUMmScuKWFF5Z7HLsgyg+VbNI0SqOmyT

EewIinE7/cbzdKmIm0ngpJTv+W0dFjW6P4VA/e9HAAhIv9CkCgWPFI74Q4ZxL9sN

fv4vLWKlXRYRDwgKPCq0hX/zUbB8g9+gDhSyTPVsniGCbxpvA3TAIAuKYmWg1762

DIn82bIzGNisgz8ZSQizBUvn1uffem40ckPRzTUmyBNL+c+h4wr0dhwZho/VO+i6

gaVKa69FFcpZROHZjchVwoxHX95oSXBzcuP6/UjQtFKRuKByitYPJxIV4C4z1iNk

f8qGBh8E4YctCjLuDSEt0y6VE/A9rZOE+xTO2iYZ1VbhnvlF8+RPOU3nPImpQ0H4

9FrR4Uq+V/EUDRhfEqT23F4BLrtjyCdZySXtlbToDRc3SccdSIs=

=40bx

—–END PGP SIGNATURE—–

Share this article