Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 9.4 ~ 9.4.1 | - | |
| Splunk | Splunk Cloud Platform | 9.3.2408 ~ 9.3.2408.107 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-20229 | 8.0 HIGH | Remote Code Execution through file upload to “$SPLUNK_HOME/var/run/splunk/apptemp“ directo |
| CVE-2025-20231 | 7.1 HIGH | Sensitive Information Disclosure in Splunk Secure Gateway App |
| CVE-2025-20228 | 6.5 MEDIUM | Maintenance mode state change of App Key Value Store (KVStore) through a Cross-Site Reques |
| CVE-2025-20232 | 5.7 MEDIUM | Risky Command Safeguards Bypass in “/app/search/search“ endpoint through “s“ parameter in |
| CVE-2025-20227 | 4.3 MEDIUM | Information Disclosure through external content warning modal dialog box bypass in Splunk |
| CVE-2025-20230 | 4.3 MEDIUM | Missing Access Control and Incorrect Ownership of Data in App Key Value Store (KVStore) co |
| CVE-2025-20233 | 2.5 LOW | Incorrect permissions set by the “chmod“ and “makedirs“ Python functions in Splunk App for |
No comments yet