CVE-2025-20378
Severity CVSS v4.0:
Pending analysis
Type:
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Publication date:
12/11/2025
Last modified:
03/12/2025
Description
In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.
Impact
Base Score 3.x
3.10
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.2.0 (including) | 9.2.9 (excluding) |
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.3.0 (including) | 9.3.7 (excluding) |
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.4.0 (including) | 9.4.5 (excluding) |
| cpe:2.3:a:splunk:splunk:10.0.0:*:*:*:enterprise:*:*:* | ||
| cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* | 9.3.2408 (including) | 9.3.2408.121 (excluding) |
| cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* | 9.3.2411 (including) | 9.3.2411.111 (excluding) |
| cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* | 10.0.2503 (including) | 10.0.2503.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



