Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands ( for more information. Note that the attack is browser-based and an attacker cannot exploit it at will. (CVSS:4.0) (Last Update:2022-06-24) Latest security vulnerabilities (Bypass) (CVSS score >= 4)  

More To Explore