Use of Hard-coded Cryptographic Key Affecting arcade-mcp-server package, versions [,1.9.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-ARCADEMCPSERVER-14171924
  • published3 Dec 2025
  • disclosed2 Dec 2025
  • creditQi Deng

Introduced: 2 Dec 2025

NewCVE-2025-66454  (opens in a new tab)
CWE-321  (opens in a new tab)

How to fix?

Upgrade arcade-mcp-server to version 1.9.1 or higher.

Overview

arcade-mcp-server is a Model Context Protocol (MCP) server framework for Arcade.dev

Affected versions of this package are vulnerable to Use of Hard-coded Cryptographic Key via the HTTP server uses a hardcoded default worker secret ("dev") that is never validated or overridden during normal server startup. An attacker can gain unauthorized access to all HTTP worker endpoints by forging valid JWTs using the known default secret.

CVSS Base Scores

version 4.0
version 3.1