CVE-2025-20378

LOW

Splunk Enterprise <10.0.1-9.3.7-9.2.9 - Open Redirect

Title source: llm
STIX 2.1

Description

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.

Scores

CVSS v3 3.1
EPSS 0.0005
EPSS Percentile 16.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-601
Status published
Products (3)
splunk/splunk 10.0.0
splunk/splunk 9.2.0 - 9.2.9
splunk/splunk_cloud_platform 9.3.2408 - 9.3.2408.121
Published Nov 12, 2025
Tracked Since Feb 18, 2026