Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66454: CWE-321: Use of Hard-coded Cryptographic Key in ArcadeAI arcade-mcp

0
Medium
VulnerabilityCVE-2025-66454cvecve-2025-66454cwe-321cwe-798
Published: Tue Dec 02 2025 (12/02/2025, 18:23:33 UTC)
Source: CVE Database V5
Vendor/Project: ArcadeAI
Product: arcade-mcp

Description

Arcade MCP allows you to to create, deploy, and share MCP Servers. Prior to 1.5.4, the arcade-mcp HTTP server uses a hardcoded default worker secret ("dev") that is never validated or overridden during normal server startup. As a result, any unauthenticated attacker who knows this default key can forge valid JWTs and fully bypass the FastAPI authentication layer. This grants remote access to all worker endpoints—including tool enumeration and tool invocation—without credentials. This vulnerability is fixed in 1.5.4.

AI-Powered Analysis

AILast updated: 12/02/2025, 19:05:53 UTC

Technical Analysis

CVE-2025-66454 is a cryptographic key management vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) and CWE-798 (Use of Hard-coded Credentials) affecting the arcade-mcp HTTP server component of ArcadeAI prior to version 1.5.4. The server employs a hardcoded default worker secret with the value "dev" that is never validated or replaced during normal startup. This secret is used to sign JSON Web Tokens (JWTs) for authentication purposes within the FastAPI framework. Because the secret is hardcoded and publicly known, any unauthenticated attacker can forge valid JWTs, effectively bypassing the authentication mechanism. This grants full remote access to all worker endpoints, including sensitive operations such as tool enumeration and invocation, without requiring any credentials or user interaction. The vulnerability does not impact availability but compromises confidentiality and integrity by allowing unauthorized access and potential manipulation of server functions. The flaw arises from insecure cryptographic key management and lack of proper secret rotation or validation. The issue was publicly disclosed on December 2, 2025, and fixed in arcade-mcp version 1.5.4. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the access gained make this a significant risk.

Potential Impact

For European organizations using arcade-mcp versions prior to 1.5.4, this vulnerability poses a serious risk to the confidentiality and integrity of their systems. Attackers can remotely bypass authentication controls without any credentials, gaining unauthorized access to internal APIs and tools. This could lead to unauthorized data disclosure, manipulation of internal processes, and potential lateral movement within the network. Organizations relying on arcade-mcp for critical operations or sensitive data processing may face compliance violations under GDPR due to unauthorized data access. The lack of availability impact reduces the risk of service disruption but does not diminish the threat of data compromise. Given the remote, unauthenticated nature of the exploit, attackers can operate stealthily, increasing the risk of prolonged undetected breaches. The vulnerability's medium CVSS score reflects the balance between ease of exploitation and the scope of impact, but the actual risk may be higher in environments where arcade-mcp is exposed to untrusted networks or integrated with sensitive workflows.

Mitigation Recommendations

The primary mitigation is to upgrade arcade-mcp to version 1.5.4 or later, where the hardcoded default worker secret issue is resolved. Until upgrade is possible, organizations should implement network-level access controls to restrict access to the arcade-mcp HTTP server to trusted internal hosts only. Employing firewall rules, VPNs, or zero-trust network segmentation can reduce exposure. Additionally, monitoring and logging all access to the arcade-mcp endpoints can help detect suspicious activity indicative of JWT forgery attempts. If feasible, organizations should audit their deployment configurations to ensure no legacy or fallback secrets are in use. Implementing runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect anomalous JWT tokens may provide temporary defense. Finally, educating development and operations teams about secure cryptographic key management practices will help prevent similar issues in future deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-01T18:44:35.639Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692f3503e0601f8fcd752d4c

Added to database: 12/2/2025, 6:50:43 PM

Last enriched: 12/2/2025, 7:05:53 PM

Last updated: 12/2/2025, 7:52:41 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats