Description
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.8, 9.3.9, and 9.2.12, and Splunk Cloud Platform versions below 10.2.2510.3, 10.1.2507.8, 10.0.2503.9, and 9.3.2411.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload into the `realname`, `tz`, or `email` parameters of the `/splunkd/__raw/services/authentication/users/username` REST API endpoint when they change a password. This could potentially lead to a client‑side denial‑of‑service (DoS). The malicious payload might significantly slow page load times or render Splunk Web temporarily unresponsive.
Problem types
Product status
9.4 (custom) before 9.4.8
9.3 (custom) before 9.3.9
9.2 (custom) before 9.2.12
10.1.2507 (custom) before 10.1.2507.8
10.0.2503 (custom) before 10.0.2503.9
9.3.2411 (custom) before 9.3.2411.121
Credits
STÖK / Fredrik Alexandersson
References
advisory.splunk.com/advisories/SVD-2026-0204