Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2094 articles · 154715 vulns · 36/41 feeds (7d)
← Back to list
6.5
CVE-2026-20238PATCHED
Splunk · Splunk AI Toolkit

Improper Access Control through Role Inheritance in Splunk AI Toolkit app

Description

In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data that was restricted through `srchFilter` configurations on custom roles.<br><br>The app contains an `authorize.conf` configuration file with a `srchFilter` entry that modifies the built-in ‘user’ role. Because the Splunk platform combines inherited search filters with the `OR` SPL operator, the injected filter overrides more restrictive filters on child roles.

Affected Products

VendorProductVersions
SplunkSplunk AI Toolkit5.7

References

  • https://advisory.splunk.com/advisories/SVD-2026-0502

Related News (1 articles)

Tier C
VulDB2h ago
CVE-2026-20238 | Splunk AI Toolkit up to 5.7.2 Configuration File authorize.conf authorization (SVD-2026-0502)
→ No new info (linked only)
CVSS 3.16.5 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
5.7.3
CWECWE-863
PublishedMay 20, 2026
Last enriched1h agov2
Trending Score23
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-20239
Sensitive Information Disclosure through Log Files in Splunk Enterprise
Trending: 32
CRITICALPRE-CVE
Multiple vulnerabilities in Splunk products requiring critical updates
Trending: 30
HIGHCVE-2026-20240
Denial of Service through coldToFrozen.sh Script in Splunk Enterprise
Trending: 27
HIGHCVE-2026-20204EXP
Improper Handling and Insufficient Isolation of Specific Temporary Files in Splunk Enterprise
Trending: 1
HIGHCVE-2026-20205EXP
Sensitive Information Disclosure in ''_internal'' index in Splunk MCP Server app
Trending: 1

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 20, 2026
Discovered by ZDM
May 20, 2026
Updated: affectedVersions
May 20, 2026
Patch Available
May 20, 2026

Version History

v2
Last enriched 1h ago
v2Tier C1h ago

Updated affected versions to include 5.7.2, changed severity to HIGH, and noted that no exploit exists.

affectedVersions
via VulDB
v11h ago

Initial creation