Description
In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve sensitive information by inspecting the job's search log due to improper access control in the MongoClient logging channel.
INFO
Published Date :
2026-03-11T16:17:54.427Z
Last Modified :
2026-03-12T16:19:44.284Z
Source :
cisco
AFFECTED PRODUCTS
The following products are affected by CVE-2026-20165 vulnerability.
| Vendors | Products |
|---|---|
| Splunk |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-20165.
| URL | Resource |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2026-0304 |
|
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact