CVE-2025-20378

MEDIUM WAF: Medium
CVSS 6.1 Published: 2025-11-12
CWE-601

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.

WAF Coverage Analysis

Open Redirect Medium WAF Coverage

OWASP: A01:2021 Broken Access Control

941xxx - XSS / XXE

Affected Software

VendorProductVersion
splunksplunk9.2.0 - 9.2.9
splunksplunk9.3.0 - 9.3.7
splunksplunk9.4.0 - 9.4.5
splunksplunk10.0.0
splunksplunk_cloud_platform9.3.2408 - 9.3.2408.121
splunksplunk_cloud_platform9.3.2411 - 9.3.2411.111
splunksplunk_cloud_platform10.0.2503 - 10.0.2503.5

References

Back to CVE Database