Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
Problem types
Product status
10.0 (custom) before 10.0.3
9.4 (custom) before 9.4.5
9.3 (custom) before 9.3.7
9.2 (custom) before 9.2.9
10.0 (custom) before 10.0.2503.9
9.3.2411 (custom) before 9.3.2411.112
9.3.2408 (custom) before 9.3.2408.122
Credits
Anton (therceman)
References
advisory.splunk.com/advisories/SVD-2026-0202