CVE-2025-20229

Published Mar 26, 2025

Last updated 8 days ago

Overview

Description
In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) through a file upload to the "$SPLUNK_HOME/var/run/splunk/apptemp" directory due to missing authorization checks.
Source
psirt@cisco.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Primary
Base score
8
Impact score
5.9
Exploitability score
2.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

psirt@cisco.com
CWE-284

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. هر چه سریعتر Splunk رو update کنید. به تازگی برای سرویس دفاعی Splunk، آسیب پذیری با کد شناسایی CVE-2025-20229 و از نوع file upload منتشر شده است که به هکرها در نهایت امکان‌ اجرای RCE را می دهد. https://t.co/Poz3aKY03t https://t.co/c7OBz4UtNW

    @AmirHossein_sec

    4 Apr 2025

    25 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨 CVE-2025-20229 🔴 HIGH (8) 🏢 Splunk - Splunk Enterprise 🏗️ 9.4 🔗 https://t.co/Kh0zjZswAE #CyberCron #VulnAlert #InfoSec https://t.co/5oqqDgRdiS

    @cybercronai

    28 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Critical vulnerabilities in Splunk Enterprise and Cloud have been patched, addressing RCE and data leak risks (CVE-2025-20229, CVE-2025-20231). Organizations advised to check user access controls. 🛡️🔒 #Splunk #DataSecurity #USA link: https://t.co/eV3lC4exvt https://t.co/D7YyKk

    @TweetThreatNews

    27 Mar 2025

    106 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Splunk has patched several vulnerabilities, including a high-severity remote code execution flaw (CVE-2025-20229) in Splunk Enterprise. Update ASAP to enhance security! ⚠️🔒 #SplunkUpdates #DataProtection #USA link: https://t.co/a7WJA2Wa0H https://t.co/OMXbnc9aJc

    @TweetThreatNews

    27 Mar 2025

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. #Splunk a publié des correctifs pour plusieurs vulnérabilités. Parmi celles-ci, la CVE-2025-20229 permet à un utilisateur authentifié d'exécuter un code arbitraire en téléchargeant un fichier dans un dossier spécifique. https://t.co/0OOtPLysIy

    @cert_ist

    27 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2025-20229 and CVE-2025-20231 impacts Splunk #Splunk #CVE-2025-20229 #CVE-2025-20231 https://t.co/4GQfmAvjLE

    @pravin_karthik

    27 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Splunkは、2件の高深刻度脆弱性(CVE-2025-20229およびCVE-2025-20231)に対するセキュリティアップデートを公開した。 CVE-2025-20229は、Splunk EnterpriseおよびSplunk Cloud Platformに影響するリモートコード実行脆弱性。

    @yousukezan

    27 Mar 2025

    3004 Impressions

    4 Retweets

    18 Likes

    5 Bookmarks

    0 Replies

    2 Quotes

  8. Splunk Alert: RCE (CVE-2025-20229) and Data Leak (CVE-2025-20231) Vulnerabilities Threaten Platforms Splunk has released a security advisory detailing critical vulnerabilities affecting Splunk Enterprise and Splunk Cloud Platform. https://t.co/dnN9gD5QmW

    @the_yellow_fall

    27 Mar 2025

    734 Impressions

    4 Retweets

    13 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  9. �� CVE-2025-20229 - Splunk Enterprise and Splunk Cloud Platform - HIGH 🚨 🗓️ Date published 2025-03-26 22:15:14 UTC #SplunkEnterpriseandSplunkCloudPlatform #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/ciEQBoB56O

    @vulns_space

    26 Mar 2025

    27 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes