Impact
The vulnerability allows an authenticated user with the edit_cmd capability to execute arbitrary shell commands through the unarchive_cmd parameter of the /splunkd/__upload/indexing/preview REST endpoint. This results in full remote code execution on the Splunk platform, compromising confidentiality, integrity, and availability. The weakness is a command injection flaw, identified as CWE‑77.
Affected Systems
Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform releases older than 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and 9.3.2411.124 are affected. Users who can grant themselves or others the edit_cmd capability are at risk.
Risk and Exploitability
The CVSS score of 8 indicates high severity. EPSS is reported to be below 1%, suggesting a low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Once the edit_cmd privilege is available, the attacker can gain complete system compromise. Prevention hinges on applying the vendor's patch or removing the privileged capability.
OpenCVE Enrichment