CVE-2026-20202 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10,
Image via images.unsplash.com
CVE-2026-20202 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-20202 | vulnerability | CVE-2026-20202 |
| CWE-176 | weakness | CWE-176 |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 15, 2026 at 19:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.