In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 04 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk mcp Server
Vendors & Products Splunk
Splunk mcp Server

Wed, 03 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Title SPL commands allowlist controls bypass in Splunk MCP Server app through "run_splunk_query" MCP tool
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-12-03T21:29:51.839Z

Reserved: 2024-10-10T19:15:13.263Z

Link: CVE-2025-20381

cve-icon Vulnrichment

Updated: 2025-12-03T21:29:45.690Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-03T17:15:50.180

Modified: 2025-12-04T17:15:08.283

Link: CVE-2025-20381

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-04T16:44:17Z

Weaknesses