CVE-2025-20381

In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Configurations

No configuration.

History

03 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-03 17:15

Updated : 2025-12-03 17:15


NVD link : CVE-2025-20381

Mitre link : CVE-2025-20381

CVE.ORG link : CVE-2025-20381


JSON object : View

Products Affected

No product.

CWE
CWE-863

Incorrect Authorization