CVE-2025-66454: CWE-321: Use of Hard-coded Cryptographic Key in ArcadeAI arcade-mcp
Arcade MCP allows you to to create, deploy, and share MCP Servers. Prior to 1.5.4, the arcade-mcp HTTP server uses a hardcoded default worker secret ("dev") that is never validated or overridden during normal server startup. As a result, any unauthenticated attacker who knows this default key can forge valid JWTs and fully bypass the FastAPI authentication layer. This grants remote access to all worker endpoints—including tool enumeration and tool invocation—without credentials. This vulnerability is fixed in 1.5.4.
AI Analysis
Technical Summary
CVE-2025-66454 is a cryptographic key management vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) and CWE-798 (Use of Hard-coded Credentials) affecting the arcade-mcp HTTP server component of ArcadeAI prior to version 1.5.4. The server employs a hardcoded default worker secret with the value "dev" that is never validated or replaced during normal startup. This secret is used to sign JSON Web Tokens (JWTs) for authentication purposes within the FastAPI framework. Because the secret is hardcoded and publicly known, any unauthenticated attacker can forge valid JWTs, effectively bypassing the authentication mechanism. This grants full remote access to all worker endpoints, including sensitive operations such as tool enumeration and invocation, without requiring any credentials or user interaction. The vulnerability does not impact availability but compromises confidentiality and integrity by allowing unauthorized access and potential manipulation of server functions. The flaw arises from insecure cryptographic key management and lack of proper secret rotation or validation. The issue was publicly disclosed on December 2, 2025, and fixed in arcade-mcp version 1.5.4. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the access gained make this a significant risk.
Potential Impact
For European organizations using arcade-mcp versions prior to 1.5.4, this vulnerability poses a serious risk to the confidentiality and integrity of their systems. Attackers can remotely bypass authentication controls without any credentials, gaining unauthorized access to internal APIs and tools. This could lead to unauthorized data disclosure, manipulation of internal processes, and potential lateral movement within the network. Organizations relying on arcade-mcp for critical operations or sensitive data processing may face compliance violations under GDPR due to unauthorized data access. The lack of availability impact reduces the risk of service disruption but does not diminish the threat of data compromise. Given the remote, unauthenticated nature of the exploit, attackers can operate stealthily, increasing the risk of prolonged undetected breaches. The vulnerability's medium CVSS score reflects the balance between ease of exploitation and the scope of impact, but the actual risk may be higher in environments where arcade-mcp is exposed to untrusted networks or integrated with sensitive workflows.
Mitigation Recommendations
The primary mitigation is to upgrade arcade-mcp to version 1.5.4 or later, where the hardcoded default worker secret issue is resolved. Until upgrade is possible, organizations should implement network-level access controls to restrict access to the arcade-mcp HTTP server to trusted internal hosts only. Employing firewall rules, VPNs, or zero-trust network segmentation can reduce exposure. Additionally, monitoring and logging all access to the arcade-mcp endpoints can help detect suspicious activity indicative of JWT forgery attempts. If feasible, organizations should audit their deployment configurations to ensure no legacy or fallback secrets are in use. Implementing runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect anomalous JWT tokens may provide temporary defense. Finally, educating development and operations teams about secure cryptographic key management practices will help prevent similar issues in future deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-66454: CWE-321: Use of Hard-coded Cryptographic Key in ArcadeAI arcade-mcp
Description
Arcade MCP allows you to to create, deploy, and share MCP Servers. Prior to 1.5.4, the arcade-mcp HTTP server uses a hardcoded default worker secret ("dev") that is never validated or overridden during normal server startup. As a result, any unauthenticated attacker who knows this default key can forge valid JWTs and fully bypass the FastAPI authentication layer. This grants remote access to all worker endpoints—including tool enumeration and tool invocation—without credentials. This vulnerability is fixed in 1.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-66454 is a cryptographic key management vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) and CWE-798 (Use of Hard-coded Credentials) affecting the arcade-mcp HTTP server component of ArcadeAI prior to version 1.5.4. The server employs a hardcoded default worker secret with the value "dev" that is never validated or replaced during normal startup. This secret is used to sign JSON Web Tokens (JWTs) for authentication purposes within the FastAPI framework. Because the secret is hardcoded and publicly known, any unauthenticated attacker can forge valid JWTs, effectively bypassing the authentication mechanism. This grants full remote access to all worker endpoints, including sensitive operations such as tool enumeration and invocation, without requiring any credentials or user interaction. The vulnerability does not impact availability but compromises confidentiality and integrity by allowing unauthorized access and potential manipulation of server functions. The flaw arises from insecure cryptographic key management and lack of proper secret rotation or validation. The issue was publicly disclosed on December 2, 2025, and fixed in arcade-mcp version 1.5.4. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the access gained make this a significant risk.
Potential Impact
For European organizations using arcade-mcp versions prior to 1.5.4, this vulnerability poses a serious risk to the confidentiality and integrity of their systems. Attackers can remotely bypass authentication controls without any credentials, gaining unauthorized access to internal APIs and tools. This could lead to unauthorized data disclosure, manipulation of internal processes, and potential lateral movement within the network. Organizations relying on arcade-mcp for critical operations or sensitive data processing may face compliance violations under GDPR due to unauthorized data access. The lack of availability impact reduces the risk of service disruption but does not diminish the threat of data compromise. Given the remote, unauthenticated nature of the exploit, attackers can operate stealthily, increasing the risk of prolonged undetected breaches. The vulnerability's medium CVSS score reflects the balance between ease of exploitation and the scope of impact, but the actual risk may be higher in environments where arcade-mcp is exposed to untrusted networks or integrated with sensitive workflows.
Mitigation Recommendations
The primary mitigation is to upgrade arcade-mcp to version 1.5.4 or later, where the hardcoded default worker secret issue is resolved. Until upgrade is possible, organizations should implement network-level access controls to restrict access to the arcade-mcp HTTP server to trusted internal hosts only. Employing firewall rules, VPNs, or zero-trust network segmentation can reduce exposure. Additionally, monitoring and logging all access to the arcade-mcp endpoints can help detect suspicious activity indicative of JWT forgery attempts. If feasible, organizations should audit their deployment configurations to ensure no legacy or fallback secrets are in use. Implementing runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect anomalous JWT tokens may provide temporary defense. Finally, educating development and operations teams about secure cryptographic key management practices will help prevent similar issues in future deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-01T18:44:35.639Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692f3503e0601f8fcd752d4c
Added to database: 12/2/2025, 6:50:43 PM
Last enriched: 12/2/2025, 7:05:53 PM
Last updated: 12/2/2025, 7:52:41 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65877: n/a
UnknownCVE-2025-13658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Industrial Video & Control Longwatch
CriticalCVE-2025-13542: CWE-269 Improper Privilege Management in DesignThemes DesignThemes LMS
CriticalCVE-2025-13510: CWE-306 Missing Authentication for Critical Function in Iskra iHUB and iHUB Lite
CriticalCVE-2025-60736: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.