
CVE-2025-20233 – Incorrect permissions set by the “chmod“ and “makedirs“ Python functions in Splunk App for Lookup File Editing
https://notcve.org/view.php?id=CVE-2025-20233
26 Mar 2025 — In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-privileged user. • https://advisory.splunk.com/advisories/SVD-2025-0310 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-32714 – Path Traversal in Splunk App for Lookup File Editing
https://notcve.org/view.php?id=CVE-2023-32714
01 Jun 2023 — In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory. • https://advisory.splunk.com/advisories/SVD-2023-0608 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-35: Path Traversal: '.../ •

CVE-2023-32715 – Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing
https://notcve.org/view.php?id=CVE-2023-32715
01 Jun 2023 — In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will. • https://advisory.splunk.com/advisories/SVD-2023-0610 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •