In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 03 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Title SPL commands allowlist controls bypass in Splunk MCP Server app through "run_splunk_query" MCP tool
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-12-03T17:00:25.945Z

Reserved: 2024-10-10T19:15:13.263Z

Link: CVE-2025-20381

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-03T17:15:50.180

Modified: 2025-12-03T17:15:50.180

Link: CVE-2025-20381

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.