Brief Summary: Splunk Enterprise CVE-2026-20204 Remote Code Execution via Temporary File Upload

A short review of CVE-2026-20204, a remote code execution vulnerability in Splunk Enterprise and Splunk Cloud Platform that allows low privileged users to upload malicious files to the apptemp directory. This post covers the technical root cause, affected versions, and the notable pattern of recurring vulnerabilities in the same attack surface.

CVE Analysis

5 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-15

Brief Summary: Splunk Enterprise CVE-2026-20204 Remote Code Execution via Temporary File Upload
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A low privileged user on a Splunk deployment can achieve remote code execution by uploading a malicious file to a temporary directory, and this is the second time in roughly a year that this exact attack surface has been disclosed. CVE-2026-20204 affects both Splunk Enterprise and Splunk Cloud Platform, carrying a CVSS score of 7.1, and its resemblance to CVE-2025-20229 from March 2025 makes it particularly noteworthy for defenders who thought this issue was already resolved.

Technical Information

The vulnerability is rooted in how Splunk handles temporary files within the $SPLUNK_HOME/var/run/splunk/apptemp directory. This directory is used during application management operations, and the flaw is classified under CWE-377: Insecure Temporary File.

The core problem is twofold: improper handling and insufficient isolation of temporary files within the apptemp directory. Splunk fails to adequately restrict which users can write files to this location and does not properly validate or sandbox the contents of uploaded files. As a result, a user holding only a low privilege Splunk role (anything below admin or power) can place a malicious file into this directory.

Attack Flow

The exploitation path is straightforward, which adds to the risk profile:

  1. The attacker authenticates to the Splunk instance with any valid low privilege account. No admin or power role is required.
  2. The attacker crafts a malicious file designed for code execution within the Splunk runtime environment.
  3. The attacker uploads this file to the $SPLUNK_HOME/var/run/splunk/apptemp directory, exploiting the insufficient access controls and file isolation on this path.
  4. Due to the improper handling of temporary files, the uploaded payload is processed or executed by Splunk, granting the attacker remote code execution on the underlying system.

Preconditions

A critical precondition for exploitation is that Splunk Web must be turned on. The web interface provides the attack surface through which the file upload is performed. If Splunk Web is disabled, this particular vector is not reachable.

Workaround

For organizations that cannot immediately upgrade, Splunk recommends turning off Splunk Web as a temporary mitigation. Administrators should consult Splunk's documentation on disabling unnecessary components to implement this change.

For permanent remediation, upgrading to the fixed versions listed below is required.

Affected Systems and Versions

Splunk Enterprise

All versions below the following are vulnerable:

Release TrainFixed Version
10.2.x10.2.1
10.0.x10.0.5
9.4.x9.4.10
9.3.x9.3.11

Splunk Cloud Platform

All versions below the following are vulnerable:

Release TrainFixed Version
10.4.x10.4.2603.0
10.3.x10.3.2512.5
10.2.x10.2.2510.9
10.1.x10.1.2507.19
10.0.x10.0.2503.13
9.3.x9.3.2411.127

The vulnerability is only exploitable when Splunk Web is enabled. Deployments with the web interface disabled are not affected by this specific attack vector.

Vendor Security History

This vulnerability is not an isolated incident. In March 2025, Splunk disclosed SVD-2025-0301, tracked as CVE-2025-20229. That vulnerability allowed a low privileged user without admin or power roles to perform remote code execution through a file upload to the exact same $SPLUNK_HOME/var/run/splunk/apptemp directory.

The attack vector, the privilege requirements, and the target directory are all identical between the 2025 and 2026 variants. This recurrence strongly suggests that the original fix for CVE-2025-20229 was either incomplete or that the underlying architectural issue in how Splunk manages the apptemp directory was not fully addressed.

Splunk, now operating under Cisco following the completed acquisition in March 2024, was named a Leader in the 2025 Gartner Magic Quadrant for SIEM for the eleventh consecutive time. The vendor has substantial resources and market credibility, which makes the recurrence of this specific vulnerability class worth monitoring closely.

References

Detect & fix
what others miss

Security magnifying glass visualization