The vulnerability, CVE-2025-66416, is not directly in the FastMCP codebase but in one of its dependencies, the mcp (Model Context Protocol) SDK. FastMCP versions prior to 2.14.0 allowed the use of vulnerable versions of the mcp SDK. The fix, implemented in FastMCP version 2.14.0, is to update the dependency requirement for the mcp SDK to version 1.23.1 or later, which contains the security patch.
The analysis of the patch commit for FastMCP reveals changes to accommodate the updated mcp SDK. Specifically, the TokenHandler class in src/fastmcp/server/auth/oauth_proxy.py was modified. A new handle method was introduced, which wraps the handle method of the _SDKTokenHandler from the mcp library. This indicates that TokenHandler.handle is a key function in FastMCP that interacts with the authentication components of the mcp SDK.
Given that the commit message for the patch explicitly mentions 'auth changes', it is highly probable that the vulnerability in the mcp SDK is related to authentication. Therefore, any exploit targeting this vulnerability through a FastMCP application would have the TokenHandler.handle function in its execution path, making it a key runtime indicator for identifying exploitation attempts.