Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk App for Lookup File Editing | 4.0 ~ 4.0.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-20229 | 8.0 HIGH | Remote Code Execution through file upload to “$SPLUNK_HOME/var/run/splunk/apptemp“ directo |
| CVE-2025-20231 | 7.1 HIGH | Sensitive Information Disclosure in Splunk Secure Gateway App |
| CVE-2025-20228 | 6.5 MEDIUM | Maintenance mode state change of App Key Value Store (KVStore) through a Cross-Site Reques |
| CVE-2025-20226 | 5.7 MEDIUM | Risky command safeguards bypass in “/services/streams/search“ endpoint through “q“ paramet |
| CVE-2025-20232 | 5.7 MEDIUM | Risky Command Safeguards Bypass in “/app/search/search“ endpoint through “s“ parameter in |
| CVE-2025-20227 | 4.3 MEDIUM | Information Disclosure through external content warning modal dialog box bypass in Splunk |
| CVE-2025-20230 | 4.3 MEDIUM | Missing Access Control and Incorrect Ownership of Data in App Key Value Store (KVStore) co |
No comments yet