Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Splunk Patches Dozens of Vulnerabilities

Splunk patches high-severity remote code execution and information disclosure flaws in Splunk Enterprise and Secure Gateway App.

Splunk vulnerability patches

Splunk on Wednesday announced patches for dozens of vulnerabilities across its products, including two high-severity flaws in Splunk Enterprise and Secure Gateway App.

The enterprise monitoring solution received patches for a remote code execution (RCE) bug that could be exploited by low-privileged users by uploading a file to the ‘$SPLUNK_HOME/var/run/splunk/apptemp’ directory.

Tracked as CVE-2025-20229 (CVSS score of 8.0), the security defect is caused by a missing authorization check, and has been addressed with the release of Splunk Enterprise versions 9.4.0, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208.

Fixes were also rolled out for a high-severity information disclosure issue impacting both Splunk Enterprise and the Splunk Secure Gateway app on Splunk Cloud Platform, also exploitable by low-privileged users.

“The Splunk Secure Gateway exposes user session and authorization tokens in clear text in the splunk_secure_gateway.log file when it calls the /services/ssg/secrets REST endpoint,” Splunk explains.

According to the company, an attacker could exploit this vulnerability as part of a phishing attack that convinces the victim into “initiating a request within their browser”. The attacker should not be able to exploit the bug at will, Splunk says.

Patches for this flaw were included in Splunk Enterprise versions 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and in Secure Gateway versions 3.8.38 and 3.7.23.

“Splunk Mobile, Spacebridge, and Mission Control rely on functionality in the Splunk Secure Gateway app. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app,” the company explains.

Advertisement. Scroll to continue reading.

On Wednesday, Splunk also announced fixes for medium-severity security defects in Splunk Enterprise that could lead to maintenance mode modifications, safeguard bypass, information disclosure, and manipulation of other user data.

Additionally, the company announced the roll-out of patches for a low-severity issue in Splunk App for Lookup Editing and for multiple vulnerabilities in third-party packages in Splunk Enterprise, App for Data Science and Deep Learning App, DB Connect, Infrastructure Monitoring Add-on, and Splunk Add-on for Microsoft Cloud Services.

Splunk makes no mention of any of these vulnerabilities being exploited in the wild. However, users are advised to update their Splunk Enterprise instances and other affected Splunk applications as soon as possible. Additional information can be found on the company’s security advisories page.

Related: Atlassian, Splunk Patch High-Severity Vulnerabilities

Related: Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities

Related: Recent Splunk Enterprise Vulnerability Easy to Exploit: Security Firm

Related: Splunk Patches High-Severity Vulnerabilities in Enterprise Product

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Security awareness training firm KnowBe4 has named Bryan Palma as president and CEO effective May 5.

Threat intelligence firm Team Cymru has appointed Joe Sander as its Chief Executive Officer.

Madhu Gottumukkala has been named Deputy Director of the cybersecurity agency CISA.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.