Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-20378


In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.


Published

2025-11-12T18:15:34.847

Last Modified

2025-12-03T21:43:31.337

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 3.1 (LOW)

Weaknesses
  • Type: Secondary
    CWE-601

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk < 9.2.9 Yes
Application splunk splunk < 9.3.7 Yes
Application splunk splunk < 9.4.5 Yes
Application splunk splunk 10.0.0 Yes
Application splunk splunk_cloud_platform < 9.3.2408.121 Yes
Application splunk splunk_cloud_platform < 9.3.2411.111 Yes
Application splunk splunk_cloud_platform < 10.0.2503.5 Yes

References