{"api_version":"1","generated_at":"2026-04-23T00:40:48+00:00","cve":"CVE-2023-22938","urls":{"html":"https://cve.report/CVE-2023-22938","api":"https://cve.report/api/cve/CVE-2023-22938.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-22938","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-22938"},"summary":{"title":"CVE-2023-22938","description":"In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘sendemail’ REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the ‘splunk-system-user’ account on the local instance.","state":"PUBLIC","assigner":"prodsec@splunk.com","published_at":"2023-02-14 18:15:00","updated_at":"2023-11-07 04:07:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2023-0208","name":"https://advisory.splunk.com/advisories/SVD-2023-0208","refsource":"MISC","tags":[],"title":"SVD-2023-0208 | Splunk Vulnerability Disclosure","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-22938","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22938","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"22938","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"splunk","cpe5":"splunk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"22938","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"splunk","cpe5":"splunk_cloud_platform","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-22938","qid":"378004","title":"Splunk Enterprise Multiple Vulnerabilities (SVD-2023-0215,SVD-2023-0211,SVD-2023-0208)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-22938","ASSIGNER":"prodsec@splunk.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘sendemail’ REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the ‘splunk-system-user’ account on the local instance."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.","cweId":"CWE-285"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Splunk","product":{"product_data":[{"product_name":"Splunk Enterprise","version":{"version_data":[{"version_affected":"<","version_name":"8.1","version_value":"8.1.13"},{"version_affected":"<","version_name":"8.2","version_value":"8.2.10"},{"version_affected":"<","version_name":"9.0","version_value":"9.0.4"}]}},{"product_name":"Splunk Cloud Platform","version":{"version_data":[{"version_affected":"<","version_name":"-","version_value":"9.0.2212"}]}}]}}]}},"references":{"reference_data":[{"url":"https://advisory.splunk.com/advisories/SVD-2023-0208","refsource":"MISC","name":"https://advisory.splunk.com/advisories/SVD-2023-0208"}]},"source":{"advisory":"SVD-2023-0208"},"credits":[{"lang":"en","value":"James Ervin, Splunk"}],"impact":{"cvss":[{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1","baseScore":4.3,"baseSeverity":"MEDIUM"}]}},"nvd":{"publishedDate":"2023-02-14 18:15:00","lastModifiedDate":"2023-11-07 04:07:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"8.2.0","versionEndExcluding":"8.2.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.13","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.2209.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}