CVE-2026-20205 – Splunk MCP Server
CVSS 7.2
IMPORTANT
“When control systems are exposed, attackers gain a direct path into the heart of operations.”
Splunk has released a security patch for CVE-2026-20205 affecting the Splunk MCP Server. This vulnerability impacts core server functionality and could allow unauthorized interaction with managed processes, increasing the risk of system manipulation or service disruption. The CVSS score is 7.2, which is High severity.
There is no verified evidence of real-world exploitation or publicly available proof-of-concept code. Even so, the vulnerability presents a meaningful threat to environments relying on MCP Server for operational control and coordination.
Key Details
- Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- High
- User Interaction
- None
- CWE Classification
- CWE-532
Patch this CVE on all your endpoints in under 5 minutes.
First 200 endpoints are free forever, scale as needed.