Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1210 |
|
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk mcp Server |
|
| Vendors & Products |
Splunk
Splunk mcp Server |
Wed, 03 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions. | |
| Title | SPL commands allowlist controls bypass in Splunk MCP Server app through "run_splunk_query" MCP tool | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-12-03T21:29:51.839Z
Reserved: 2024-10-10T19:15:13.263Z
Link: CVE-2025-20381
Updated: 2025-12-03T21:29:45.690Z
Status : Deferred
Published: 2025-12-03T17:15:50.180
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-20381
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:44:17Z