Fixed Intel
Aggregated IntelIndustry News

Splunk Enterprise Update Patches Code Execution Vulnerability

The flaw allows low-privileged users to upload files to a temporary directory to achieve remote code execution.

FIFixed Intel Team||2 min read|3 Views
Splunk Enterprise Update Patches Code Execution Vulnerability

Aggregated from SecurityWeek

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

Splunk has announced fixes for vulnerabilities in Splunk Enterprise, Cloud Platform, and MCP Server, as well as in third-party packages across its products.

A high-severity flaw in Splunk Enterprise and Cloud Platform, tracked as CVE-2026-20204, could be exploited by low-privileged users to upload a malicious file to a temporary directory and achieve remote code execution (RCE).

The bug exists because temporary files are improperly handled and are not sufficiently isolated in that directory, Splunk says.

Two medium-severity issues were addressed in Splunk Enterprise and Cloud Platform. One could be exploited to create usernames containing a null byte or a non-UTF-8 percent-encoded byte, preventing their conversion to a proper format, while the other allows attackers to turn Data Model Acceleration on or off.

Users should update to Splunk Enterprise versions 10.2.2, 10.0.5, 9.4.10, 9.3.11, or higher, which contain fixes for all these security defects. Splunk is patching Cloud Platform instances.

On Wednesday, the company also resolved CVE-2026-20205, a high-severity vulnerability in the MCP Server app that could allow authenticated attackers to view users’ sessions and authorization tokens in clear text.

Advertisement. Scroll to continue reading.

“The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives,” Splunk notes. Fixes for the bug were included in the MCP Server app version 1.0.3.

Additionally, the company rolled out fixes for bugs in third-party packages in Splunk Enterprise, Operator for Kubernetes Add-on, IT Service Intelligence (ITSI) app, and Universal Forwarder.

Splunk makes no mention of any of these vulnerabilities being exploited in the wild. Additional information can be found on the company’s security advisories page.

Related: Cisco Patches Critical Vulnerabilities in Webex, ISE

Related: Exploited Vulnerability Exposes Nginx Servers to Hacking

Related: ‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

Related: Splunk, Zoom Patch Severe Vulnerabilities


Originally published by SecurityWeek

Original Source

SecurityWeek