CVE-2026-20163

Severity CVSS v4.0:
Pending analysis
Type:
CWE-77 Command Injection
Publication date:
11/03/2026
Last modified:
24/03/2026

Description

In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and 9.3.2411.124, a user who holds a role that contains the high-privilege capability `edit_cmd` could execute arbitrary shell commands using the `unarchive_cmd` parameter for the `/splunkd/__upload/indexing/preview` REST endpoint.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 9.3.0 (including) 9.3.10 (excluding)
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 9.4.0 (including) 9.4.9 (excluding)
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 10.0.0 (including) 10.0.4 (excluding)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* 9.3.2411 (including) 9.3.2411.124 (excluding)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* 10.0.2503 (including) 10.0.2503.12 (excluding)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* 10.1.2507 (including) 10.1.2507.16 (excluding)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* 10.2.2510 (including) 10.2.2510.5 (excluding)


References to Advisories, Solutions, and Tools