Description
In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory.
Published: 2026-04-15
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An attacker with a low-privileged account that lacks the admin or power Splunk roles can exploit a flaw in temporary file handling to execute arbitrary code on a vulnerable Splunk instance. The vulnerability allows the attacker to upload a malicious file to the apptemp directory under $SPLUNK_HOME/var/run/splunk, where the file is not properly segregated from other users’ data. This can lead to the execution of attacker‑controlled code, compromising the confidentiality, integrity, and availability of the entire Splunk deployment. The weakness is related to improper isolation of temporary resources (CWE‑377).

Affected Systems

Vulnerable deployments include Splunk Enterprise versions earlier than 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions earlier than 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127. Any installation that matches these version ranges is at risk if low‑privileged users can upload files to the temporary directory.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability. No EPSS score is available, but the lack of a KEV listing does not diminish the potential impact. Though the attacker needs only a non‑admin user, the code execution capability can be abused to gain system‑level access or pivot within the environment. The attack vector is likely to involve the standard file upload mechanism used by Splunk, which does not enforce strict isolation of the apptemp area. If the attacker successfully uploads a crafted file, the system will process it as a legitimate application component, leading to arbitrary code execution.

Generated by OpenCVE AI on April 15, 2026 at 22:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Splunk Enterprise or Splunk Cloud Platform patch that moves the temporary directory to a properly isolated location or removes the upload capability for non‑admin users, ensuring the affected versions are no longer vulnerable.
  • Restrict file upload functions so only users with admin or power roles can create files in the apptemp directory, preventing low‑privileged users from placing malicious files.
  • Isolate temporary files on a dedicated partition or mount with appropriate permissions to prevent cross‑user access.

Generated by OpenCVE AI on April 15, 2026 at 22:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise

Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory.
Title Improper Handling and Insufficient Isolation of Specific Temporary Files in Splunk Enterprise
Weaknesses CWE-377
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Splunk Splunk Cloud Platform Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-16T03:55:29.794Z

Reserved: 2025-10-08T11:59:15.397Z

Link: CVE-2026-20204

cve-icon Vulnrichment

Updated: 2026-04-15T17:46:02.374Z

cve-icon NVD

Status : Received

Published: 2026-04-15T16:16:34.490

Modified: 2026-04-15T16:16:34.490

Link: CVE-2026-20204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:30:16Z

Weaknesses