CVE-2025-20378

CWE-601Open Redirect3 documents3 sources
Severity
6.1MEDIUM
EPSS
0.0%
top 86.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 12

Description

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 1.6 | Impact: 1.4

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform10.0.250310.0.2503.5+2
NVDsplunk/splunk_cloud_platform9.3.24089.3.2408.121+2
CVEListV5splunk/splunk_enterprise10.010.0.1+3
NVDsplunk/splunk9.2.09.2.9+3

🔴Vulnerability Details

2
CVEList
Open Redirect on Web Login endpoint in Splunk Enterprise2025-11-12
GHSA
GHSA-r9qj-q2g9-r74r: In Splunk Enterprise versions below 102025-11-12