In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
References
| Link | Resource |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1210 |
Configurations
No configuration.
History
03 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-03 17:15
Updated : 2025-12-03 17:15
NVD link : CVE-2025-20381
Mitre link : CVE-2025-20381
CVE.ORG link : CVE-2025-20381
JSON object : View
Products Affected
No product.
CWE
CWE-863
Incorrect Authorization
