Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1101 |
|
Wed, 12 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk Splunk splunk Enterprise |
|
| Vendors & Products |
Splunk
Splunk splunk Splunk splunk Enterprise |
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To be successful, the attacker has to trick the victim into initiating a request from their browser. The unauthenticated attacker should not be able to exploit the vulnerability at will. | |
| Title | Open Redirect on Web Login endpoint in Splunk Enterprise | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-11-12T21:04:48.103Z
Reserved: 2024-10-10T19:15:13.263Z
Link: CVE-2025-20378
Updated: 2025-11-12T20:47:33.851Z
Status : Received
Published: 2025-11-12T18:15:34.847
Modified: 2025-11-12T18:15:34.847
Link: CVE-2025-20378
No data.
OpenCVE Enrichment
Updated: 2025-11-12T22:12:10Z