{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20367","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.261Z","datePublished":"2025-10-01T16:08:01.304Z","dateUpdated":"2025-10-01T17:40:43.251Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"10.0","status":"affected","versionType":"custom","lessThan":"10.0.0"},{"version":"9.4","status":"affected","versionType":"custom","lessThan":"9.4.4"},{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.6"},{"version":"9.2","status":"affected","versionType":"custom","lessThan":"9.2.8"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"9.3.2411","status":"affected","versionType":"custom","lessThan":"9.3.2411.109"},{"version":"9.3.2408","status":"affected","versionType":"custom","lessThan":"9.3.2408.119"},{"version":"9.2.2406","status":"affected","versionType":"custom","lessThan":"9.2.2406.122"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user."}],"value":"In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2025-1002"}],"title":"Reflected Cross-site Scripting (XSS) in '/app/search/table' endpoint through the 'dataset.command' parameter on Splunk Enterprise","datePublic":"2025-10-01T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","version":"3.1","baseScore":5.7,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.","cweId":"CWE-79"}]}],"source":{"advisory":"SVD-2025-1002"},"credits":[{"lang":"en","value":"Danylo Dmytriiev (DDV_UA)"},{"lang":"en","value":"Anudeep Gandla, Splunk"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-10-01T16:08:01.304Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-01T17:19:40.128884Z","id":"CVE-2025-20367","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T17:40:43.251Z"}}]}}