RCE in Splunk Enterprise <10.2.1 via apptemp temp file abuse
CVE-2026-20204 Published on April 15, 2026
Improper Handling and Insufficient Isolation of Specific Temporary Files in Splunk Enterprise
In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory.
Weakness Type
Insecure Temporary File
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
Products Associated with CVE-2026-20204
stack.watch emails you whenever new vulnerabilities are published in Splunk or Splunk Cloud Platform. Just hit a watch button to start following.
Affected Versions
Splunk Enterprise:- Version 10.2 and below 10.2.1 is affected.
- Version 10.0 and below 10.0.5 is affected.
- Version 9.4 and below 9.4.10 is affected.
- Version 9.3 and below 9.3.11 is affected.
- Version 10.4.2603 and below Not Affected is affected.
- Version 10.3.2512 and below 10.3.2512.5 is affected.
- Version 10.2.2510 and below 10.2.2510.9 is affected.
- Version 10.1.2507 and below 10.1.2507.19 is affected.
- Version 10.0.2503 and below 10.0.2503.13 is affected.
- Version 9.3.2411 and below 9.3.2411.127 is affected.