In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
References
| Link | Resource |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1105 |
Configurations
No configuration.
History
26 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-26 18:15
Updated : 2025-12-01 15:39
NVD link : CVE-2025-20373
Mitre link : CVE-2025-20373
CVE.ORG link : CVE-2025-20373
JSON object : View
Products Affected
No product.
CWE
CWE-532
Insertion of Sensitive Information into Log File
