[CIVN-2026-0202] Multiple Vulnerabilities in Splunk Enterprise Products

By Published On: April 23, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Splunk Enterprise Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Splunk Enterprise (Splunk Web) prior to version 10.2.1

Splunk Enterprise (REST API) prior to version 10.2.2

Splunk Enterprise (Splunk Web & REST API) prior to version 10.0.5

Splunk Enterprise (Splunk Web & REST API) prior to version 9.4.10

Splunk Enterprise (Splunk Web & REST API) prior to version 9.3.11

Splunk Cloud Platform (Splunk Web) prior to version 10.3.2512.5

Splunk Cloud Platform (REST API) prior to version 10.3.2512.6

Splunk Cloud Platform (Splunk Web) prior to version 10.2.2510.9

Splunk Cloud Platform (REST API) prior to version 10.2.2510.10

Splunk Cloud Platform (Splunk Web) prior to version 10.1.2507.19

Splunk Cloud Platform (REST API) prior to version 10.1.2507.20

Splunk Cloud Platform (Splunk Web & REST API) prior to version 10.0.2503.13

Splunk Cloud Platform (Splunk Web & REST API) prior to version 9.3.2411.127

Splunk MCP Server prior to version 1.0.3

Overview


Multiple vulnerabilities have been reported in Splunk products which could be exploited by an attacker to execute arbitrary code, gain access to sensitive information, or perform unauthorized actions on the targeted system.


Target Audience:

Organizations and individuals using Splunk Enterprise, Splunk Cloud Platform, and Splunk MCP Server.


Risk Assessment:

Potential for complete system compromise.


Impact Assessment:

High risk of information disclosure, privilege misuse, and full system compromise.


Description


Splunk is a data analytics platform that collects, indexes, and analyzes machine-generated data to enable real-time monitoring, security insights, and operational intelligence.


Multiple vulnerabilities have been reported in Splunk products due to improper access control, improper input validation, insecure handling of temporary files, and exposure of sensitive information in logs. An attacker could exploit these vulnerabilities by sending specially crafted requests to the targeted system.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain access to sensitive information, or perform unauthorized actions on the targeted system.


Solution


Apply appropriate fixes issued by the vendor:

https://advisory.splunk.com/advisories/SVD-2026-0401


https://advisory.splunk.com/advisories/SVD-2026-0402


https://advisory.splunk.com/advisories/SVD-2026-0403


https://advisory.splunk.com/advisories/SVD-2026-0407



Vendor Information


Splunk

https://advisory.splunk.com/


References


Splunk

https://advisory.splunk.com/advisories/SVD-2026-0401

https://advisory.splunk.com/advisories/SVD-2026-0402

https://advisory.splunk.com/advisories/SVD-2026-0403

https://advisory.splunk.com/advisories/SVD-2026-0407


CVE Name

CVE-2026-20202

CVE-2026-20203

CVE-2026-20204

CVE-2026-20205




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnqJ6EACgkQ3jCgcSdc

ys8FbRAAqEf5A558cFAE+PDF4OhLJAayZ5uveoNesy7QQvu8LbblyMhNPAuW5bqE

ThC9TSHA1maL6nBpClml0ljv7fKfd9x4cfteV0hYMZZ/IHYlRSDkZyFytWeL+dCJ

OSuocyMvWSN/hrtyo393FxrmwU2RihwoD2lyjShG1MhSqQNE2LczsUwi9Ygl9OoX

QQQgDu846dO/iEI2KYHuVV0m8R8Nhtjlqh1lGpCBcyH5RIdCoWRLtGAvf37HP694

PMtyAApuv8yWczBlOQ5TWp3pFPbjy/VsQIdTKiHiJmvxfPBSLhXOmYT7orAenIcb

X+NOFHw2jgWLRS1ypzGghWa9/vE2M9P7wD2VTH+IOjOql49CqI/A6Z1KKazB6Yfh

7J8NIYIFb0aSA5ufE3B8GhGhKIwqTyla3ZZDea0/CBDjqXMzvdRipVGR5Ci1+Jo6

XB3j4eALUl4YsJolYtK90kHnG0smWEk6EnufEOT3T24m9YIjTqps2BvVX8a5nckL

zFs0jeDRcTp0u0hnVQYtDzIPc1aydbyLgSThY05dW84xI26G1IljnDEEB4tfjScI

BR5f98zJOD0yCUKSbIMNYOmv6snsGbIsWxHQDCl4V3CkLkV5vBNV79y61/HFgLO4

LnFP52MogRHAqPGTUriwK8VnciCzgPiqHPS2+7gQtceIa/9Xbmw=

=rtdY

—–END PGP SIGNATURE—–

Share this article