Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

735+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-20204: Splunk Enterprise & Cloud Platform Low-Privilege RCE via Temp File Handling
CVE-2026-20204: Splunk Enterprise & Cloud Platform Low-Privilege RCE via Temp File Handling
SECURITYHIGHCVE-2026-20204

CVE-2026-20204: Splunk Enterprise & Cloud Platform Low-Privilege RCE via Temp File Handling

A high-severity vulnerability in Splunk Enterprise and Splunk Cloud Platform allows a low-privileged user without admin or power roles to achieve remote code execution by uploading a malicious file to the apptemp directory. CVSS 7.1.

Dylan H.

Security Team

April 16, 2026
6 min read

Affected Products

  • Splunk Enterprise < 10.2.1
  • Splunk Enterprise < 10.0.5
  • Splunk Enterprise < 9.4.10
  • Splunk Enterprise < 9.3.11
  • Splunk Cloud Platform < 10.4.2603.0
  • Splunk Cloud Platform < 10.3.2512.5
  • Splunk Cloud Platform < 10.2.2510.9
  • Splunk Cloud Platform < 10.1.2507.19
  • Splunk Cloud Platform < 10.0.2503.13
  • Splunk Cloud Platform < 9.3.2411.127

Executive Summary

A high-severity remote code execution vulnerability (CVE-2026-20204) affects multiple versions of Splunk Enterprise and Splunk Cloud Platform. The flaw carries a CVSS score of 7.1 and can be exploited by a low-privileged user — one who does not hold the admin or power Splunk roles — to execute arbitrary code remotely through improper handling of temporary files in the $SPLUNK_HOME/var/run/splunk/apptemp directory.

Splunk has released fixed versions and a workaround. Organizations using Splunk Web should treat this as a priority patch given the low privilege bar for exploitation.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-20204
CVSS Score7.1 (High)
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow (non-admin, non-power role)
User InteractionRequired
CWECWE-377 (Insecure Temporary Files)
Affected ComponentSplunk Web (apptemp directory)
Patch AvailableYes — Splunk April 2026 Advisory
PublishedApril 15, 2026
KEV StatusNot listed

Affected Products

Splunk Enterprise

Version LineFixed Version
10.2.x10.2.1
10.0.x10.0.5
9.4.x9.4.10
9.3.x9.3.11

Splunk Cloud Platform

Version LineFixed Version
10.4.x10.4.2603.0
10.3.x10.3.2512.5
10.2.x10.2.2510.9
10.1.x10.1.2507.19
10.0.x10.0.2503.13
9.3.x9.3.2411.127

Splunk is actively monitoring and remediating Splunk Cloud Platform instances; customers on managed cloud deployments should verify their version is updated.


Technical Analysis

Root Cause

CVE-2026-20204 stems from insufficient isolation and improper handling of temporary files in the $SPLUNK_HOME/var/run/splunk/apptemp directory, which is used by the Splunk Web component during app processing workflows. A low-privileged attacker with access to file upload workflows can place a malicious file in this directory, which is subsequently executed by the Splunk process — resulting in arbitrary code execution under the Splunk service account.

The vulnerability is classified under CWE-377 (Insecure Temporary File), a class of weaknesses where an application creates or uses temporary files in an unsafe manner, allowing attackers to substitute or inject malicious content.

Attack Requirements

The CVSS vector indicates this is not a trivial exploit:

  • AC:H — High complexity; specific conditions must be met
  • UI:R — User interaction is required (likely an admin action that processes the malicious file)
  • PR:L — Low privileges are sufficient (no admin or power role needed)

This means an attacker with a standard Splunk account could craft an attack that triggers when a privileged user interacts with the malicious file in apptemp.

Attack Flow

1. Attacker authenticates to Splunk Web with a low-privileged account
2. Attacker uploads a malicious file via an app upload or similar workflow
   that writes to $SPLUNK_HOME/var/run/splunk/apptemp
3. Attacker waits for or triggers a privileged user interaction
   (e.g., admin reviewing/processing app submissions)
4. Splunk processes the file without adequate isolation
5. Attacker's payload executes under the Splunk service context
6. Full confidentiality, integrity, and availability impact on the instance

Why This Matters

Splunk is a cornerstone of enterprise SIEM and log management infrastructure. A successful compromise means:

Impact AreaConsequence
Log TamperingAttacker can modify or delete security events and investigation artifacts
Credential AccessSplunk holds forwarded log credentials, API tokens, and service account data
Lateral MovementSplunk's network access and integrations enable pivoting to monitored systems
Blind Spot CreationCompromising the SIEM eliminates detection capability for concurrent attacks
Data ExfiltrationAccess to all ingested log data, which may contain sensitive operational information

Remediation

Step 1: Upgrade Splunk Enterprise

# Check current Splunk version
/opt/splunk/bin/splunk version
 
# Download and apply the appropriate upgrade
# Refer to Splunk's upgrade documentation at docs.splunk.com
 
# After upgrade, verify the version
/opt/splunk/bin/splunk version

Apply the following minimum versions:

  • 10.2.x → upgrade to 10.2.1
  • 10.0.x → upgrade to 10.0.5
  • 9.4.x → upgrade to 9.4.10
  • 9.3.x → upgrade to 9.3.11

Step 2: Workaround — Disable Splunk Web

If immediate patching is not possible, disable Splunk Web as a temporary mitigation:

# Edit $SPLUNK_HOME/etc/system/local/web.conf
[settings]
startwebserver = 0

Then restart Splunk:

/opt/splunk/bin/splunk restart

Note: Disabling Splunk Web removes the attack surface but also disables the web UI. Manage via CLI or API during this period.

Step 3: Restrict Access to App Upload Workflows

Limit which users can interact with app management functionality. Audit user roles and remove unnecessary permissions:

| rest /services/authorization/roles
| table title, capabilities, imported_capabilities
| where match(capabilities, "admin_all_objects|edit_local_apps")

Restrict edit_local_apps capability to the minimum required role set.

Step 4: Monitor the apptemp Directory

# Monitor for unexpected file writes to apptemp
inotifywait -m -r "$SPLUNK_HOME/var/run/splunk/apptemp" \
  -e create,modify,close_write \
  --format '%T %w %f %e' --timefmt '%Y-%m-%d %H:%M:%S'

Detection Guidance

IndicatorDescription
Unexpected files in apptemp from low-privileged accountsDirect exploitation indicator
Splunk process spawning child shells (bash, cmd.exe, python)Post-exploitation execution
Unusual network connections from Splunk service accountReverse shell or C2 beacon
File writes to apptemp outside of normal app deployment windowsSuspicious activity
Low-privileged users accessing app upload endpointsExploitation attempt

Search for suspicious apptemp activity in Splunk itself:

index=_internal sourcetype=splunkd path="*apptemp*"
| stats count by user, action, path
| where count > 5

Post-Remediation Checklist

  1. Upgrade Splunk Enterprise to the fixed version for your version line
  2. Verify Splunk Cloud Platform instances are on patched versions
  3. Audit all user accounts and remove unnecessary capabilities
  4. Review apptemp directory for unexpected or suspicious files
  5. Check Splunk audit logs for low-privileged app upload activity
  6. Scan the Splunk host for indicators of post-exploitation (web shells, cron jobs)
  7. Rotate credentials for any service accounts accessible via Splunk
  8. Consider disabling Splunk Web if it is not required in your deployment
  9. Enable file integrity monitoring on the apptemp directory going forward

References

  • NVD — CVE-2026-20204
  • Splunk Security Advisory SVD-2026-0403
  • GBHackers — Splunk Enterprise and Cloud Platform Exposed to Dangerous RCE Vulnerability
#CVE-2026-20204#Splunk#RCE#Privilege Escalation#Cloud Security#CVSS 7.1#Temp File Handling#NVD

Related Articles

CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)

A critical server-side request forgery vulnerability in Azure Custom Locations Resource Provider allows an authorized attacker to elevate privileges over...

6 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read

CVE-2026-33858: Apache Airflow XCom Payload Remote Code Execution (CVSS 8.8)

A high-severity code injection vulnerability in Apache Airflow allows DAG Authors to craft malicious XCom payloads that trigger arbitrary code execution within the webserver process. Users should upgrade to Apache Airflow 3.2.0 immediately.

6 min read
Back to all Security Alerts