{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-20384","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.264Z","datePublished":"2025-12-03T17:00:34.212Z","dateUpdated":"2025-12-03T21:32:24.714Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"10.0","status":"affected","versionType":"custom","lessThan":"10.0.1"},{"version":"9.4","status":"affected","versionType":"custom","lessThan":"9.4.6"},{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.8"},{"version":"9.2","status":"affected","versionType":"custom","lessThan":"9.2.10"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"10.1.2507","status":"affected","versionType":"custom","lessThan":"10.1.2507.4"},{"version":"10.0.2503","status":"affected","versionType":"custom","lessThan":"10.0.2503.6"},{"version":"9.3.2411","status":"affected","versionType":"custom","lessThan":"9.3.2411.117"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities."}],"value":"In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2025-1203"}],"title":"Unauthenticated Log Injection in Splunk Enterprise","datePublic":"2025-12-03T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1","baseScore":5.3,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The software does not neutralize or incorrectly neutralizes output that is written to logs.","cweId":"CWE-117"}]}],"source":{"advisory":"SVD-2025-1203"},"credits":[{"lang":"en","value":"STÖK / Fredrik Alexandersson"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-12-03T17:00:34.212Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-03T21:32:13.797275Z","id":"CVE-2025-20384","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-03T21:32:24.714Z"}}]}}