CVE-2026-20137
LOW 3.5In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
Affected Applications in Environment
5
Platform
v17,38,0,0
1 device
Platform
v17,17,0,0
1 device
Platform
v17,15,0,0
2 devices
Platform
v17,24,0,0
1 device
Universal Forwarder
v9.2.2.0
10 devices
Affected Devices
15
ARSUTLGU3FP2
Windows
ARSUTLGU3MUSEUM
Windows
ARSUTLGU4000052
Windows
ARSUTLGU4BOMBUS
Windows
ARSUTLGU4FRR037
Windows
ARSUTLGU4FRRGEO
Windows
ARSUTLGU4OPTI4
Windows
ARSUTLGU5DYKH9N
Windows
ARSUTLGU5FRR032
Windows
ARSUTLGU5ITSPEC
Windows
DPEXAN-5CD017CV
Windows
DPHSNG-34Y86X3
Windows
DPMATH-C11312G9
Windows
FL217-2-ADOTTER
Windows
MICHELLEUSUHP
Windows
References
1