2.4
CWE
311
EPSS
0.009%
Advisory Published
Updated

CVE-2025-47274: ToolHive stores secrets in the state store with no encryption

First published: Mon May 12 2025(Updated: )

ToolHive is a utility designed to simplify the deployment and management of Model Context Protocol (MCP) servers. Due to the ordering of code used to start an MCP server container, versions of ToolHive prior to 0.0.33 inadvertently store secrets in the run config files which are used to restart stopped containers. This means that an attacker who has access to the home folder of the user who starts the MCP server can read secrets without needing access to the secrets store itself. This only applies to secrets which were used in containers whose run configs exist at a point in time - other secrets remaining inaccessible. ToolHive 0.0.33 fixes the issue. Some workarounds are available. Stop and delete any running MCP servers, or manually remove any runconfigs from `$HOME/Library/Application Support/toolhive/runconfigs/` (macOS) or `$HOME/.state/toolhive/runconfigs/` (Linux).

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
ToolHive<0.0.33

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-47274?

    CVE-2025-47274 is considered a moderate severity vulnerability due to the potential exposure of secrets in configuration files.

  • How do I fix CVE-2025-47274?

    To fix CVE-2025-47274, upgrade to ToolHive version 0.0.33 or later.

  • What specifically does CVE-2025-47274 affect?

    CVE-2025-47274 affects ToolHive versions prior to 0.0.33 that improperly store secrets in run config files.

  • What are the potential risks of CVE-2025-47274?

    The risks of CVE-2025-47274 include unauthorized access to sensitive secrets stored in the run config files.

  • Is CVE-2025-47274 related to any specific software?

    Yes, CVE-2025-47274 specifically affects the ToolHive utility for managing Model Context Protocol servers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203