Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade Plack::Middleware::Session to version 0.23 or later (ideally version 0.36 or later), and set the "secret" option.
Workaround
Set the "secret" option.
Thu, 26 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Miyagawa
Miyagawa plack::middleware::session::cookie |
|
| Vendors & Products |
Miyagawa
Miyagawa plack::middleware::session::cookie |
Thu, 26 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 26 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution. Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie. | |
| Title | Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution | |
| Weaknesses | CWE-565 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-03-26T14:53:30.210Z
Reserved: 2025-07-08T15:24:38.840Z
Link: CVE-2014-125112
Updated: 2026-03-26T04:46:57.862Z
Status : Awaiting Analysis
Published: 2026-03-26T03:16:00.423
Modified: 2026-03-26T15:16:26.460
Link: CVE-2014-125112
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:08:47Z