Missing Encryption of Sensitive Data Affecting github.com/stacklok/toolhive/pkg/secrets package, versions <0.0.33


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Encryption of Sensitive Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMSTACKLOKTOOLHIVEPKGSECRETS-10494078
  • published23 Jun 2025
  • disclosed12 May 2025
  • creditUnknown

Introduced: 12 May 2025

CVE-2025-47274  (opens in a new tab)
CWE-311  (opens in a new tab)

How to fix?

Upgrade github.com/stacklok/toolhive/pkg/secrets to version 0.0.33 or higher.

Overview

Affected versions of this package are vulnerable to Missing Encryption of Sensitive Data due to the ordering of code used to start an MCP server container. An attacker can read secrets without needing access to the secrets store itself by gaining access to the home folder of the user who starts the MCP server. This is only exploitable if secrets were used in containers whose run configs exist at a point in time - other secrets remaining inaccessible.

Workaround

This vulnerability can be mitigated by stopping and deleting any running MCP servers, or manually removing any runconfigs from $HOME/Library/Application Support/toolhive/runconfigs/ (macOS) or $HOME/.state/toolhive/runconfigs/ (Linux).

CVSS Base Scores

version 4.0
version 3.1