CVE-2025-20378: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.
AI Analysis
Technical Summary
CVE-2025-20378 is a web application vulnerability affecting Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and corresponding Splunk Cloud Platform versions. The vulnerability arises because the 'return_to' parameter in the Splunk Web login endpoint accepts user-controlled input that specifies a URL to which the user is redirected after login. This parameter is not properly validated, allowing an attacker to craft a URL that redirects authenticated users to arbitrary external sites. The attacker does not need authentication but must trick a user into clicking the malicious URL. The vulnerability facilitates phishing attacks by redirecting users to malicious sites that may attempt credential theft or malware delivery. The CVSS score is 3.1 (low severity), reflecting that exploitation requires user interaction and has limited impact on confidentiality, integrity, and availability. There are no known exploits in the wild, and the vulnerability does not allow direct system compromise. However, it increases the risk of social engineering attacks leveraging Splunk’s trusted domain. The vulnerability was reserved in October 2024 and published in November 2025. No patches or workarounds are explicitly listed in the provided data, but upgrading to fixed versions is implied.
Potential Impact
For European organizations, the primary impact of CVE-2025-20378 is an increased risk of successful phishing attacks leveraging trusted Splunk URLs. Since Splunk is widely used for security information and event management (SIEM), a phishing attack exploiting this vulnerability could lead to credential theft or malware infection, potentially compromising sensitive security monitoring environments. Although the vulnerability itself does not allow direct unauthorized access or data manipulation, successful phishing could lead to broader security incidents. Organizations in sectors such as finance, energy, government, and critical infrastructure that rely heavily on Splunk for security monitoring are particularly at risk. The need for user interaction limits the scope, but targeted spear-phishing campaigns could exploit this vector effectively. The vulnerability could also erode user trust in internal security tools if exploited.
Mitigation Recommendations
1. Upgrade Splunk Enterprise and Splunk Cloud Platform to versions 10.0.1, 9.4.5, 9.3.7, 9.2.9 or later where the vulnerability is fixed. 2. Implement strict validation and whitelisting of URLs accepted in the 'return_to' parameter to prevent redirection to untrusted external sites. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect URLs targeting Splunk login endpoints. 4. Conduct targeted user awareness training emphasizing the risks of clicking unexpected or suspicious links, especially those purporting to be from internal tools like Splunk. 5. Monitor Splunk web access logs for unusual redirect parameter usage or spikes in login endpoint requests with external URLs. 6. Consider implementing multi-factor authentication (MFA) to reduce the risk of credential compromise if phishing occurs. 7. Use URL rewriting or proxying to restrict redirects to internal domains only. 8. Coordinate with security teams to integrate phishing detection and response workflows that consider this vulnerability’s exploitation vector.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-20378: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will.
AI-Powered Analysis
Technical Analysis
CVE-2025-20378 is a web application vulnerability affecting Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and corresponding Splunk Cloud Platform versions. The vulnerability arises because the 'return_to' parameter in the Splunk Web login endpoint accepts user-controlled input that specifies a URL to which the user is redirected after login. This parameter is not properly validated, allowing an attacker to craft a URL that redirects authenticated users to arbitrary external sites. The attacker does not need authentication but must trick a user into clicking the malicious URL. The vulnerability facilitates phishing attacks by redirecting users to malicious sites that may attempt credential theft or malware delivery. The CVSS score is 3.1 (low severity), reflecting that exploitation requires user interaction and has limited impact on confidentiality, integrity, and availability. There are no known exploits in the wild, and the vulnerability does not allow direct system compromise. However, it increases the risk of social engineering attacks leveraging Splunk’s trusted domain. The vulnerability was reserved in October 2024 and published in November 2025. No patches or workarounds are explicitly listed in the provided data, but upgrading to fixed versions is implied.
Potential Impact
For European organizations, the primary impact of CVE-2025-20378 is an increased risk of successful phishing attacks leveraging trusted Splunk URLs. Since Splunk is widely used for security information and event management (SIEM), a phishing attack exploiting this vulnerability could lead to credential theft or malware infection, potentially compromising sensitive security monitoring environments. Although the vulnerability itself does not allow direct unauthorized access or data manipulation, successful phishing could lead to broader security incidents. Organizations in sectors such as finance, energy, government, and critical infrastructure that rely heavily on Splunk for security monitoring are particularly at risk. The need for user interaction limits the scope, but targeted spear-phishing campaigns could exploit this vector effectively. The vulnerability could also erode user trust in internal security tools if exploited.
Mitigation Recommendations
1. Upgrade Splunk Enterprise and Splunk Cloud Platform to versions 10.0.1, 9.4.5, 9.3.7, 9.2.9 or later where the vulnerability is fixed. 2. Implement strict validation and whitelisting of URLs accepted in the 'return_to' parameter to prevent redirection to untrusted external sites. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect URLs targeting Splunk login endpoints. 4. Conduct targeted user awareness training emphasizing the risks of clicking unexpected or suspicious links, especially those purporting to be from internal tools like Splunk. 5. Monitor Splunk web access logs for unusual redirect parameter usage or spikes in login endpoint requests with external URLs. 6. Consider implementing multi-factor authentication (MFA) to reduce the risk of credential compromise if phishing occurs. 7. Use URL rewriting or proxying to restrict redirects to internal domains only. 8. Coordinate with security teams to integrate phishing detection and response workflows that consider this vulnerability’s exploitation vector.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2024-10-10T19:15:13.263Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6914cdd8e9dc40953be87356
Added to database: 11/12/2025, 6:11:36 PM
Last enriched: 11/19/2025, 7:04:09 PM
Last updated: 12/28/2025, 1:15:33 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14177: CWE-125 Out-of-bounds Read in PHP Group PHP
MediumCVE-2025-14180: CWE-476 NULL Pointer Dereference in PHP Group PHP
HighCVE-2025-14178: CWE-787 Out-of-bounds Write in PHP Group PHP
MediumCVE-2025-15109: Unrestricted Upload in jackq XCMS
MediumCVE-2025-15108: Use of Hard-coded Cryptographic Key in PandaXGO PandaX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.