Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2026-0503 |
|
Wed, 20 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
|
| Vendors & Products |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
Wed, 20 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and response bodies that contain sensitive data. | |
| Title | Sensitive Information Disclosure through Log Files in Splunk Enterprise | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2026-05-20T17:48:15.233Z
Reserved: 2025-10-08T11:59:15.400Z
Link: CVE-2026-20239
Updated: 2026-05-20T17:48:10.014Z
Status : Received
Published: 2026-05-20T18:16:26.520
Modified: 2026-05-20T18:16:26.520
Link: CVE-2026-20239
No data.
OpenCVE Enrichment
Updated: 2026-05-20T18:30:36Z