
[CIVN-2026-0136] Multiple Vulnerabilities in Splunk Enterprise Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Splunk Enterprise Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
Splunk Enterprise versions prior to 10.2.1
Splunk Enterprise versions prior to 10.0.4
Splunk Enterprise versions prior to 9.4.9
Splunk Enterprise versions prior to 9.3.10
Splunk Cloud Platform versions prior to 10.2.2510.7
Splunk Cloud Platform versions prior to 10.1.2507.17
Splunk Cloud Platform versions prior to 10.0.2503.12
Splunk Cloud Platform versions prior to 9.3.2411.124
Overview
Multiple vulnerabilities have been reported in Splunk Enterprise product which could allow an attacker to execute arbitrary code, perform Cross-Site Scripting (XSS) attack or obtain sensitive information on the targeted system.
Target Audience:
All organizations and individuals using Splunk Enterprise products.
Risk Assessment:
Potential for unauthorized access to sensitive information, execution of arbitrary commands, and Stored Cross-Site Scripting (XSS).
Impact Assessment:
High risk of information disclosure, privilege misuse, and full system compromise.
Description
Splunk Enterprise is a data platform that enables organizations to collect, index, search, analyze, and visualize machine-generated data from any source.
Multiple vulnerabilities exist in Splunk products due to improper access control, insufficient input validation and sanitization, and improper handling of user-supplied input. An attacker could exploit these vulnerabilities by sending specially crafted requests or by tricking an authenticated user into performing certain actions.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, perform Cross-Site Scripting (XSS) attack or obtain sensitive information on the targeted system.
Solution
Apply appropriate fixes issued by the vendor:
https://advisory.splunk.com/advisories/SVD-2026-0301
https://advisory.splunk.com/advisories/SVD-2026-0302
https://advisory.splunk.com/advisories/SVD-2026-0303
https://advisory.splunk.com/advisories/SVD-2026-0304
https://advisory.splunk.com/advisories/SVD-2026-0305
Vendor Information
Splunk
https://www.splunk.com/
References
Splunk
https://advisory.splunk.com/advisories/SVD-2026-0301
https://advisory.splunk.com/advisories/SVD-2026-0302
https://advisory.splunk.com/advisories/SVD-2026-0303
https://advisory.splunk.com/advisories/SVD-2026-0304
https://advisory.splunk.com/advisories/SVD-2026-0305
CVE Name
CVE-2026-20162
CVE-2026-20163
CVE-2026-20164
CVE-2026-20165
CVE-2026-20166
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=40bx
—–END PGP SIGNATURE—–


