Description
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users.
Published: 2026-04-15
Score: 6.6 Medium
EPSS: n/a
KEV: No
Impact: Account Management Disruption
Action: Patch
AI Analysis

Impact

Splunk Enterprise and Splunk Cloud Platform allow a user with the edit_user capability to create usernames that contain a null byte or a non‑UTF‑8 percent‑encoded byte. The input validation fails to normalize these values before storing them, resulting in usernames that are stored inconsistently. This inconsistency can prevent legitimate editing or deletion of the affected accounts, effectively disabling management of those user identities and compromising the normal operation of the authentication subsystem.

Affected Systems

Affected systems include Splunk Enterprise versions prior to 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions prior to 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127. Only users with a role that contains the high‑privilege edit_user capability can exploit the flaw.

Risk and Exploitability

The CVSS score of 6.6 indicates a medium severity vulnerability. No EPSS score is available, so the likelihood of exploitation is unknown, and the vulnerability is not listed in the CISA KEV catalog. The flaw requires an attacker to possess a role with the edit_user privilege, which is typically held by internal administrators. Therefore the attack vector is likely internal or from a compromised privileged account. An attacker could create malformed accounts and then cause the system to be unable to delete or modify them, leading to account management chaos. No remote code execution or privilege escalation beyond the existing edit_user role is implied by the provided information.

Generated by OpenCVE AI on April 15, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Splunk Enterprise to version 10.2.2 or later and Splunk Cloud Platform to version 10.4.2603.0 or later.
  • Restrict the edit_user capability to only trusted administrative roles and audit role assignments regularly.
  • Implement application‑level validation to reject usernames containing null bytes or non‑UTF‑8 percent‑encoded characters until an official patch is applied.

Generated by OpenCVE AI on April 15, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise

Wed, 15 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users.
Title Improper Input Validation during User Account Creation in Splunk Enterprise
Weaknesses CWE-176
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Splunk Splunk Cloud Platform Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-16T03:55:28.582Z

Reserved: 2025-10-08T11:59:15.397Z

Link: CVE-2026-20202

cve-icon Vulnrichment

Updated: 2026-04-15T18:44:34.952Z

cve-icon NVD

Status : Received

Published: 2026-04-15T16:16:34.120

Modified: 2026-04-15T16:16:34.120

Link: CVE-2026-20202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:30:12Z

Weaknesses