Splunk warns of high-severity RCE flaw that can let privileged users run shell commands
Splunk has disclosed a high-severity remote command execution vulnerability that can let a user with a powerful role execute arbitrary shell commands on the underlying server. The flaw, tracked as CVE-2026-20163, affects both Splunk Enterprise and Splunk Cloud Platform, and it stems from unsafe handling of input during uploaded file preview before indexing.
The issue sits in the /splunkd/__upload/indexing/preview REST endpoint. According to Splunk, an attacker who already has a role that includes the edit_cmd capability can abuse the unarchive_cmd parameter to execute shell commands. Splunk classifies the bug under CWE-77, which covers command injection weaknesses, and rates it 8.0 on CVSS v3.1.
This means the flaw is serious, but it is not a no-click internet worm. An attacker needs high privileges first. Even so, many enterprise security incidents start with one compromised account and then expand from there, so a bug that lets a privileged user break out into shell command execution deserves urgent attention. That is especially true on systems where role assignments have grown too broad over time.
Splunk says the vulnerability affects Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10. On the cloud side, affected Splunk Cloud Platform releases include versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.12, and 9.3.2411.124. Splunk Enterprise 10.2.0 is listed as not affected.
Splunk has already published a fix path. The company says customers should upgrade Splunk Enterprise to 10.2.0, 10.0.4, 9.4.9, 9.3.10, or later. For Splunk Cloud Platform, Splunk says it is actively monitoring and patching affected instances.
If admins cannot patch right away, Splunk recommends removing the high-privilege edit_cmd capability from roles as a workaround. That breaks the published exploit path because the vulnerable flow depends on that capability. Splunk also notes that it has no specific detection signatures for this vulnerability, which makes proactive patching and privilege review more important.
Why this flaw matters
The advisory points to a narrow but dangerous attack path. It does not give a low-privilege outsider instant access, but it can hand shell-level execution to a user who already holds a sensitive permission. In real environments, that can turn an internal compromise, stolen admin session, or overprivileged role into full server control.
The vulnerable function appears during indexing preview, which may not look like an obvious attack surface at first glance. That is part of the risk. Features built for convenience often get less scrutiny than login flows or internet-facing dashboards, yet they can still expose powerful backend behavior when input validation fails.
Affected products and fixes
| Product | Affected versions | Fixed version |
|---|---|---|
| Splunk Enterprise 10.2 | Not affected | 10.2.0 |
| Splunk Enterprise 10.0 | 10.0.0 to 10.0.3 | 10.0.4 |
| Splunk Enterprise 9.4 | 9.4.0 to 9.4.8 | 9.4.9 |
| Splunk Enterprise 9.3 | 9.3.0 to 9.3.9 | 9.3.10 |
| Splunk Cloud Platform 10.2.2510 | Below 10.2.2510.5 | 10.2.2510.5 |
| Splunk Cloud Platform 10.1.2507 | Below 10.1.2507.16 | 10.1.2507.16 |
| Splunk Cloud Platform 10.0.2503 | Below 10.0.2503.12 | 10.0.2503.12 |
| Splunk Cloud Platform 9.3.2411 | Below 9.3.2411.124 | 9.3.2411.124 |
Source: Splunk advisory SVD-2026-0302.
What admins should do now
- Check whether any user roles still include the
edit_cmdcapability. - Upgrade Splunk Enterprise to a fixed version as soon as possible.
- Review Splunk Cloud Platform version status and confirm patch status with Splunk if needed.
- Remove
edit_cmdfrom roles if an immediate upgrade is not possible. - Audit who can access upload preview and related indexing workflows.
- Treat this as both a patching issue and a privilege management issue.
Key details at a glance
- CVE: CVE-2026-20163
- Severity: High
- CVSS v3.1: 8.0
- Weakness type: CWE-77 command injection
- Component:
/splunkd/__upload/indexing/previewREST endpoint - Trigger: Abuse of the
unarchive_cmdparameter - Required privilege: Role containing
edit_cmd - Detection guidance: None listed by Splunk
- Main workaround: Remove
edit_cmdfrom roles
FAQ
It is a Splunk remote command execution vulnerability that lets a user with the edit_cmd capability run arbitrary shell commands through a REST endpoint used for upload preview.
No. Splunk lists Splunk Enterprise 10.2.0 as not affected in the advisory.
Yes. Splunk says several Splunk Cloud Platform branches are affected below specific fixed versions, and the company is actively monitoring and patching cloud instances.
Based on Splunk’s advisory, no. The attacker must hold a role that includes the high-privilege edit_cmd capability.
Splunk says they should remove the edit_cmd capability from roles as a mitigation.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages