Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. arcade-mcp-server
  4. ›
  5. CVE-2025-66454

CVE-2025-66454: arcade-mcp-server Has Default Hardcoded Worker Secret That Allows Full Unauthorized Access to All HTTP MCP Worker Endpoints

December 2, 2025

The arcade-mcp HTTP server uses a hardcoded default worker secret (“dev”) that is never validated or overridden during normal server startup. As a result, any unauthenticated attacker who knows this default key can forge valid JWTs and fully bypass the FastAPI authentication layer. This grants remote access to all worker endpoints—including tool enumeration and tool invocation—without credentials.

Anyone following the official quick-start guide is vulnerable unless they manually override ARCADE_WORKER_SECRET.

References

  • github.com/ArcadeAI/arcade-mcp
  • github.com/ArcadeAI/arcade-mcp/commit/44660d18ceb220600401303df860a31ca766c817
  • github.com/ArcadeAI/arcade-mcp/commit/7fb097f20fbea35e382a1b78da6fd90609c55a9e
  • github.com/ArcadeAI/arcade-mcp/pull/691
  • github.com/ArcadeAI/arcade-mcp/security/advisories/GHSA-g2jx-37x6-6438
  • github.com/advisories/GHSA-g2jx-37x6-6438
  • nvd.nist.gov/vuln/detail/CVE-2025-66454

Code Behaviors & Features

Detect and mitigate CVE-2025-66454 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.9.1

Fixed versions

  • 1.9.1

Solution

Upgrade to version 1.9.1 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

pypi/arcade-mcp-server/CVE-2025-66454.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:19:15 +0000.