{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20204","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.397Z","datePublished":"2026-04-15T15:17:54.019Z","dateUpdated":"2026-04-16T03:55:29.794Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"10.2","status":"affected","versionType":"custom","lessThan":"10.2.1"},{"version":"10.0","status":"affected","versionType":"custom","lessThan":"10.0.5"},{"version":"9.4","status":"affected","versionType":"custom","lessThan":"9.4.10"},{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.11"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"10.4.2603","status":"affected","versionType":"custom","lessThan":"Not Affected"},{"version":"10.3.2512","status":"affected","versionType":"custom","lessThan":"10.3.2512.5"},{"version":"10.2.2510","status":"affected","versionType":"custom","lessThan":"10.2.2510.9"},{"version":"10.1.2507","status":"affected","versionType":"custom","lessThan":"10.1.2507.19"},{"version":"10.0.2503","status":"affected","versionType":"custom","lessThan":"10.0.2503.13"},{"version":"9.3.2411","status":"affected","versionType":"custom","lessThan":"9.3.2411.127"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory."}],"value":"In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2026-0403"}],"title":"Improper Handling and Insufficient Isolation of Specific Temporary Files in Splunk Enterprise","datePublic":"2026-04-15T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.1","baseScore":7.1,"baseSeverity":"HIGH"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"Creating and using insecure temporary files can leave application and system data vulnerable to attack.","cweId":"CWE-377"}]}],"source":{"advisory":"SVD-2026-0403"},"credits":[{"lang":"en","value":"Gabriel Nitu, Splunk"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-04-15T15:17:54.019Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-15T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-20204"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-16T03:55:29.794Z"}}]}}