CVE-2025-20381 - CERT CVE
ID CVE-2025-20381
Sažetak In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
Reference
CVSS
Base: 5.4
Impact: 2.5
Exploitability:2.8
Pristup
VektorSloženostAutentikacija
NETWORK LOW LOW
Impact
PovjerljivostCjelovitostDostupnost
NONE LOW LOW
CVSS vektor CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Zadnje važnije ažuriranje 04-12-2025 - 17:15
Objavljeno 03-12-2025 - 17:15