In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Dec 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 15 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk splunk Enterprise
|
|
| CPEs | cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Splunk splunk Enterprise
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Splunk
Published: 2023-11-16T20:15:25.838Z
Updated: 2025-12-16T18:23:23.962Z
Reserved: 2023-10-18T17:02:51.236Z
Link: CVE-2023-46214
Updated: 2024-08-02T20:37:40.138Z
Status : Modified
Published: 2023-11-16T21:15:08.630
Modified: 2024-11-21T08:28:05.150
Link: CVE-2023-46214
No data.