HomeSplunkCVE-2025-20378

CVE-2025-20378

LOW
3.1CVSS
Published: 2025-11-12
Updated: 2025-12-03
AI Analysis

Description

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-601

Metadata

Primary Vendor
SPLUNK
Published
11/12/2025
Last Modified
12/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

splunk : splunksplunk : splunksplunk : splunksplunk : splunksplunk : splunk_cloud_platformsplunk : splunk_cloud_platformsplunk : splunk_cloud_platform

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief