Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20378: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. in Splunk Splunk Enterprise

0
Low
VulnerabilityCVE-2025-20378cvecve-2025-20378
Published: Wed Nov 12 2025 (11/12/2025, 17:22:56 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.

AI-Powered Analysis

AILast updated: 11/19/2025, 19:04:09 UTC

Technical Analysis

CVE-2025-20378 is a web application vulnerability affecting Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and corresponding Splunk Cloud Platform versions. The vulnerability arises because the 'return_to' parameter in the Splunk Web login endpoint accepts user-controlled input that specifies a URL to which the user is redirected after login. This parameter is not properly validated, allowing an attacker to craft a URL that redirects authenticated users to arbitrary external sites. The attacker does not need authentication but must trick a user into clicking the malicious URL. The vulnerability facilitates phishing attacks by redirecting users to malicious sites that may attempt credential theft or malware delivery. The CVSS score is 3.1 (low severity), reflecting that exploitation requires user interaction and has limited impact on confidentiality, integrity, and availability. There are no known exploits in the wild, and the vulnerability does not allow direct system compromise. However, it increases the risk of social engineering attacks leveraging Splunk’s trusted domain. The vulnerability was reserved in October 2024 and published in November 2025. No patches or workarounds are explicitly listed in the provided data, but upgrading to fixed versions is implied.

Potential Impact

For European organizations, the primary impact of CVE-2025-20378 is an increased risk of successful phishing attacks leveraging trusted Splunk URLs. Since Splunk is widely used for security information and event management (SIEM), a phishing attack exploiting this vulnerability could lead to credential theft or malware infection, potentially compromising sensitive security monitoring environments. Although the vulnerability itself does not allow direct unauthorized access or data manipulation, successful phishing could lead to broader security incidents. Organizations in sectors such as finance, energy, government, and critical infrastructure that rely heavily on Splunk for security monitoring are particularly at risk. The need for user interaction limits the scope, but targeted spear-phishing campaigns could exploit this vector effectively. The vulnerability could also erode user trust in internal security tools if exploited.

Mitigation Recommendations

1. Upgrade Splunk Enterprise and Splunk Cloud Platform to versions 10.0.1, 9.4.5, 9.3.7, 9.2.9 or later where the vulnerability is fixed. 2. Implement strict validation and whitelisting of URLs accepted in the 'return_to' parameter to prevent redirection to untrusted external sites. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect URLs targeting Splunk login endpoints. 4. Conduct targeted user awareness training emphasizing the risks of clicking unexpected or suspicious links, especially those purporting to be from internal tools like Splunk. 5. Monitor Splunk web access logs for unusual redirect parameter usage or spikes in login endpoint requests with external URLs. 6. Consider implementing multi-factor authentication (MFA) to reduce the risk of credential compromise if phishing occurs. 7. Use URL rewriting or proxying to restrict redirects to internal domains only. 8. Coordinate with security teams to integrate phishing detection and response workflows that consider this vulnerability’s exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914cdd8e9dc40953be87356

Added to database: 11/12/2025, 6:11:36 PM

Last enriched: 11/19/2025, 7:04:09 PM

Last updated: 12/28/2025, 1:15:33 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats