Splunk Security Updates – 04 December 2025

Splunk has released security updates to fix several vulnerabilities across multiple Splunk products.

The addressed vulnerabilities could allow the attacker to cause unvalidated redirects to malicious sites, conduct denial of service attacks, perform cross-site scripting attacks, gain elevated privileges, bypass security restrictions, and obtain sensitive information from the affected products.

Sample of the addressed vulnerabilities:

Splunk Enterprise Information Disclosure Vulnerability (CVE-2025-20386):

  • CVSS: 8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Consequences: Obtain Information

Sample of the affected products:

  • Splunk Enterprise (Splunk Web) versions below 10.0.2, and versions 9.4.0 tom9.4.5, 9.3.0 to 9.3.7, and 9.2.0 to 9.2.9.
  • Splunk Enterprise (Windows Installer) versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10.
  • Splunk Universal Forwarder for Windows versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10.
  • Splunk Cloud Platform (Splunk Web) versions below 10.1.2507.6, 10.0.2503.7, and 9.3.2411.117.
  • Splunk Secure Gateway app versions below 3.9.10, 3.8.58, 3.7.28, and equivalent.
  • Splunk MCP Server app versions below 0.2.4.
Vulnerabilities
  • CVE-2025-20378
  • CVE-2025-20379
  • CVE-2025-20373
  • CVE-2025-20385
  • CVE-2025-20386
  • CVE-2025-20387
  • CVE-2025-20382
  • CVE-2025-20383
  • CVE-2025-20384
  • CVE-2025-20388
  • CVE-2025-20389
  • CVE-2025-20381
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Splunk Security Updates

References