Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2026-0502 |
|
Wed, 20 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data that was restricted through `srchFilter` configurations on custom roles.<br><br>The app contains an `authorize.conf` configuration file with a `srchFilter` entry that modifies the built-in ‘user’ role. Because the Splunk platform combines inherited search filters with the `OR` SPL operator, the injected filter overrides more restrictive filters on child roles. | |
| Title | Improper Access Control through Role Inheritance in Splunk AI Toolkit app | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2026-05-20T17:48:46.704Z
Reserved: 2025-10-08T11:59:15.400Z
Link: CVE-2026-20238
Updated: 2026-05-20T17:48:42.981Z
Status : Received
Published: 2026-05-20T18:16:26.393
Modified: 2026-05-20T18:16:26.393
Link: CVE-2026-20238
No data.
OpenCVE Enrichment
Updated: 2026-05-20T19:00:07Z