Impact
A flaw in Splunk MCP Server app versions earlier than 1.0.3 allows an authenticated user with the appropriate role or permission to read session and authorization tokens in clear text from the Splunk _internal index. The weakness is a case of information disclosure (CWE-532). If exploited, attackers could gain a clear view of authentication tokens used by services and users, potentially enabling session hijacking or privilege escalation, thereby compromising confidentiality and integrity of the system.
Affected Systems
Any Splunk MCP Server deployment running a version older than 1.0.3 is affected. The vulnerability exists regardless of the installation environment as long as the user has either a role that can access the _internal index or the mcp_tool_admin capability.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity, and although EPSS is not available, the lack of a publicly disclosed exploit coupled with the need for internal index access suggests that the attack would likely require local or privileged access, or the ability to impersonate a privileged account. The vulnerability is not listed in CISA’s KEV catalog, implying no known active exploitation. The risk remains significant if internal indexes are accessed by compromised accounts or misconfigured roles.
OpenCVE Enrichment