Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-20162— Stored Cross-Site Scripting (XSS) through Path Traversal in Splunk Enterprise

CVSS 6.3 · Medium EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-20162

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Stored Cross-Site Scripting (XSS) through Path Traversal in Splunk Enterprise
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, and Splunk Cloud Platform versions below 10.2.2510.4, 10.1.2507.15, 10.0.2503.11, and 9.3.2411.123, a low-privileged user who does not hold the "admin" or "power" Splunk roles could craft a malicious payload when creating a View (Settings - User Interface - Views) at the `/manager/launcher/data/ui/views/_new` endpoint leading to a Stored Cross-Site Scripting (XSS) through a path traversal vulnerability. This could result in execution of unauthorized JavaScript code in the browser of a user. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Splunk Enterprise 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Splunk Enterprise是美国Splunk公司的一套数据收集分析软件。 Splunk Enterprise 10.2.0之前版本、10.0.3之前版本、9.4.9之前版本和9.3.9之前版本以及Splunk Cloud Platform 10.2.2510.4之前版本、10.1.2507.15之前版本、10.0.2503.11之前版本和9.3.2411.123之前版本存在跨站脚本漏洞,该漏洞源于路径遍历问题,可能导致存储型跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SplunkSplunk Enterprise 10.0 ~ 10.0.3 -
SplunkSplunk Cloud Platform 10.2.2510 ~ 10.2.2510.4 -

II. Public POCs for CVE-2026-20162

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-20162

登录查看更多情报信息。

Same Patch Batch · Splunk · 2026-03-11 · 5 CVEs total

CVE-2026-201638.0 HIGHRemote Command Execution (RCE) through the '/splunkd/__upload/indexing/preview' REST endpo
CVE-2026-201646.5 MEDIUMSensitive Information Disclosure through Improper Access Control in Splunk Enterprise
CVE-2026-201656.3 MEDIUMSensitive Information Disclosure in MongoClient logging channel in Splunk Enterprise
CVE-2026-201665.4 MEDIUMSensitive Information Disclosure in Discover Splunk Observability Cloud app for Splunk Ent

IV. Related Vulnerabilities

V. Comments for CVE-2026-20162

No comments yet


Leave a comment