In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://advisory.splunk.com/advisories/SVD-2025-1004 |
![]() ![]() |
History
Wed, 01 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 01 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the "admin" or "power" Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks. | |
Title | Extensible Markup Language (XML) External Entity Injection (XXE) through Dashboard label field on Splunk Enterprise | |
Weaknesses | CWE-776 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-10-01T17:36:17.809Z
Reserved: 2024-10-10T19:15:13.261Z
Link: CVE-2025-20369

Updated: 2025-10-01T17:22:51.744Z

Status : Received
Published: 2025-10-01T17:15:40.080
Modified: 2025-10-01T17:15:40.080
Link: CVE-2025-20369

No data.

No data.