CVE-2026-20205 – Splunk MCP Server

CVSS 7.2 IMPORTANT

“When control systems are exposed, attackers gain a direct path into the heart of operations.”

Splunk has released a security patch for CVE-2026-20205 affecting the Splunk MCP Server. This vulnerability impacts core server functionality and could allow unauthorized interaction with managed processes, increasing the risk of system manipulation or service disruption. The CVSS score is 7.2, which is High severity.

There is no verified evidence of real-world exploitation or publicly available proof-of-concept code. Even so, the vulnerability presents a meaningful threat to environments relying on MCP Server for operational control and coordination.

Key Details

Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
CWE Classification
CWE-532
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.