CVE-2023-32707

HIGH

Splunk Enterprise <9.0.5 - Privilege Escalation

Title source: llm

Description

In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.

Exploits (3)

exploitdb WORKING POC
by Redway Security · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51747
nomisec WORKING POC 2 stars
by 9xN · poc
https://github.com/9xN/CVE-2023-32707
metasploit WORKING POC EXCELLENT
by Mr Hack (try_to_hack) Santiago Lopez, Heyder Andrade, Redway Security <redwaysecurity.com> · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb

Scores

CVSS v3 8.8
EPSS 0.8268
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-285
Status published
Products (2)
splunk/splunk 8.1.0 - 8.1.14
splunk/splunk_cloud_platform < 9.0.2303.100
Published Jun 01, 2023
Tracked Since Feb 18, 2026