Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Splunk Rolls Out Urgent Patches for Token Leak Flaws

Splunk Rolls Out Urgent Patches for Token Leak Flaws Splunk Rolls Out Urgent Patches for Token Leak Flaws
IMAGE CREDITS: GARY STEELE/LINKEDIN

Splunk has issued a wave of security updates addressing dozens of vulnerabilities, including two major flaws in Splunk Enterprise and the Secure Gateway App that could expose systems to remote attacks and sensitive data leaks.

The enterprise observability giant disclosed the patches on Wednesday, highlighting a high-risk remote code execution (RCE) vulnerability tracked as CVE-2025-20229. With a CVSS score of 8.0, this bug could allow low-privileged users to execute unauthorized code by uploading a malicious file to the $SPLUNK_HOME/var/run/splunk/apptemp directory.

This critical flaw stems from a missing authorization check, making it especially dangerous for organizations that haven’t yet applied the fix. Splunk has resolved the issue in the following versions of Splunk Enterprise: 9.4.0, 9.3.3, 9.2.5, and 9.1.8. Cloud users are covered under Splunk Cloud Platform versions 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208.

High-Severity Token Exposure in Secure Gateway App

Another serious vulnerability affects both Splunk Enterprise and the Splunk Secure Gateway App. This flaw could result in the exposure of user session and authorization tokens in plaintext within log files.

Splunk confirmed that when the Secure Gateway App interacts with the /services/ssg/secrets REST endpoint, it logs sensitive token data to the splunk_secure_gateway.log file. If a threat actor tricks a user into initiating a browser request—possibly via phishing—they could potentially intercept these tokens. However, Splunk reassures users that the attack can’t be launched without user interaction.

Fixes for this vulnerability have been applied in Splunk Enterprise versions 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and in Secure Gateway versions 3.8.38 and 3.7.23.

For organizations not actively using the Secure Gateway App or related tools like Splunk Mobile, Spacebridge, or Mission Control, Splunk advises that removing or disabling the app can serve as an additional layer of protection.

More Patches Covering Medium and Low-Risk Bugs

In addition to the high-severity issues, Splunk has also fixed several medium-risk vulnerabilities that could allow:

  • Unauthorized switching to maintenance mode
  • Information leaks
  • Bypass of internal safeguards
  • Tampering with user data

The company also patched a low-severity issue in the Splunk App for Lookup Editing, alongside multiple vulnerabilities in third-party components used in:

  • App for Data Science and Deep Learning
  • DB Connect
  • Infrastructure Monitoring Add-on
  • Splunk Add-on for Microsoft Cloud Services

No Known Exploits Yet, But Immediate Updates Urged

So far, Splunk has not reported any known in-the-wild exploitation of these vulnerabilities. However, security experts strongly recommend that administrators update all affected Splunk Enterprise deployments and relevant apps immediately to stay protected.

More technical details and update instructions can be found on Splunk’s official security advisories page.

Share with others