{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20165","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.390Z","datePublished":"2026-03-11T16:17:54.427Z","dateUpdated":"2026-03-12T16:19:44.284Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"10.2","status":"affected","versionType":"custom","lessThan":"10.2.1"},{"version":"10.0","status":"affected","versionType":"custom","lessThan":"10.0.4"},{"version":"9.4","status":"affected","versionType":"custom","lessThan":"9.4.9"},{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.10"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"10.2.2510","status":"affected","versionType":"custom","lessThan":"10.2.2510.7"},{"version":"10.1.2507","status":"affected","versionType":"custom","lessThan":"10.1.2507.17"},{"version":"10.0.2503","status":"affected","versionType":"custom","lessThan":"10.0.2503.12"},{"version":"9.3.2411","status":"affected","versionType":"custom","lessThan":"9.3.2411.124"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could retrieve sensitive information by inspecting the job's search log due to improper access control in the MongoClient logging channel."}],"value":"In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could retrieve sensitive information by inspecting the job's search log due to improper access control in the MongoClient logging channel."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2026-0304"}],"title":"Sensitive Information Disclosure in MongoClient logging channel in Splunk Enterprise","datePublic":"2026-03-11T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1","baseScore":6.3,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.","cweId":"CWE-532"}]}],"source":{"advisory":"SVD-2026-0304"},"credits":[{"lang":"en","value":"John Copeland"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-03-11T16:17:54.427Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-532","lang":"en","description":"CWE-532 Insertion of Sensitive Information into Log File"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-12T15:40:54.433220Z","id":"CVE-2026-20165","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-12T16:19:44.284Z"}}]}}