{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "9.2.0"
              },
              {
                "fixed": "9.2.10"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "9.3.0"
              },
              {
                "fixed": "9.3.8"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "9.4.0"
              },
              {
                "fixed": "9.4.6"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "10.0.0"
              },
              {
                "fixed": "10.0.2"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "9.3.2411"
              },
              {
                "fixed": "9.3.2411.120"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "10.0.2503"
              },
              {
                "fixed": "10.0.2503.8"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "10.1.2507"
              },
              {
                "fixed": "10.1.2507.10"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.10, 10.0.2503.8, and 9.3.2411.120, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a views dashboard with a custom background using the `data:image/png;base64` protocol that could potentially lead to an unvalidated redirect. This behavior circumvents the Splunk external URL warning mechanism by using a specially crafted URL, allowing for a redirection to an external malicious site. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.",
  "id": "CVE-2025-20382",
  "modified": "2026-03-10T21:53:39.497853213Z",
  "published": "2025-12-03T17:15:50.380Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1201"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}