{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T18:56:44.106","vulnerabilities":[{"cve":{"id":"CVE-2025-20227","sourceIdentifier":"psirt@cisco.com","published":"2025-03-26T22:15:14.637","lastModified":"2025-07-21T20:51:45.463","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could bypass the external content warning modal dialog box in Dashboard Studio dashboards which could lead to an information disclosure."},{"lang":"es","value":"En las versiones de Splunk Enterprise anteriores a 9.4.1, 9.3.3, 9.2.5 y 9.1.8, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 y 9.1.2308.214, un usuario con pocos privilegios que no tenga los roles de \"admin\" o \"power\" de Splunk podría omitir el cuadro de diálogo modal de advertencia de contenido externo en los paneles de Dashboard Studio, lo que podría provocar una divulgación de información."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"9.1.0","versionEndExcluding":"9.1.8","matchCriteriaId":"49EE75F0-2AD6-4712-9E2A-C000A44E5605"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"9.2.0","versionEndExcluding":"9.2.4","matchCriteriaId":"E31DE8DF-1AAD-4570-93E3-711C07FE1227"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"9.3.0","versionEndExcluding":"9.3.3","matchCriteriaId":"E66E66BA-AFC2-4E0A-B233-9E2C7D985AF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:9.4.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"AD39F156-52DB-4F43-8528-37500E3AEB89"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.2308","versionEndExcluding":"9.1.2308.214","matchCriteriaId":"2E95F34F-276A-4B6C-B317-DB58839B34CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.2312","versionEndExcluding":"9.1.2312.208","matchCriteriaId":"CE9FAFD0-7787-425C-81D9-705E99B53E6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"9.2.2403","versionEndExcluding":"9.2.2403.115","matchCriteriaId":"A79896AF-1111-47AE-A84E-9D897BF2031C"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"9.2.2406.100","versionEndExcluding":"9.2.2406.113","matchCriteriaId":"000487DA-0E58-4953-A4BD-BEF09D825246"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"9.3.2408.100","versionEndExcluding":"9.3.2408.107","matchCriteriaId":"E0D477D5-C135-4D18-BC7D-94D4A5F34E1D"}]}]}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2025-0306","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}