Description
Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key.

Business::OnlinePayment::StoredTransaction generates a secret key by using a MD5 hash of a single call to the built-in rand function, which is unsuitable for cryptographic use.

This key is intended for encrypting credit card transaction data.
Published: 2026-03-31
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality compromise of credit card data
Action: Immediate Patch
AI Analysis

Impact

Business::OnlinePayment::StoredTransaction uses a single call to the built‑in rand function, hashes the result with MD5, and treats that as an encryption key. Because rand is a low‑entropy pseudorandom generator and MD5 is not cryptographically secure, the secret key is predictable and vulnerable to brute force or collision attacks. As a result, credit card transaction data that relies on this key for encryption can be decrypted or altered by an attacker, compromising both confidentiality and integrity of payment information. The weakness is aligned with CWE‑338 and CWE‑693.

Affected Systems

The vulnerability affects the Perl module Business::OnlinePayment::StoredTransaction, specifically all releases up through version 0.01. Users of this module in any environment that stores encrypted transaction data are concerned.

Risk and Exploitability

The CVSS score of 9.1 indicates a high‑severity flaw. The EPSS score of fewer than 1% suggests that, while discovery is unlikely, the impact remains substantial. The vulnerability is not listed in the CISA KEV catalog, yet an attacker who can execute or incorporate the module—whether by running the application, injecting malicious code, or accessing stored data—can potentially reconstruct the weak key and decrypt payment records. The most likely attack vector is local or remote code execution within a web or payment application that imports this module, as inferred from the nature of the crate.

Generated by OpenCVE AI on March 31, 2026 at 16:24 UTC.

Remediation

Vendor Workaround

Apply the patch that uses Crypt::URandom to generate a secret key.


OpenCVE Recommended Actions

  • Apply the patch that uses Crypt::URandom to generate a secret key.
  • Verify that the business application has been updated to the patched version of Business::OnlinePayment::StoredTransaction.
  • Audit any stored credit card data to ensure it has been reencrypted with a secure key after the patch.
  • If the patch cannot be applied immediately, consider disabling encryption for stored transactions or moving sensitive data to a separate, properly protected storage component.

Generated by OpenCVE AI on March 31, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Mock
Mock business::onlinepayment::storedtransaction
Vendors & Products Mock
Mock business::onlinepayment::storedtransaction
References

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key. Business::OnlinePayment::StoredTransaction generates a secret key by using a MD5 hash of a single call to the built-in rand function, which is unsuitable for cryptographic use. This key is intended for encrypting credit card transaction data.
Title Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key
Weaknesses CWE-338
CWE-693
References

Subscriptions

Mock Business::onlinepayment::storedtransaction
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-31T18:18:47.103Z

Reserved: 2026-03-29T14:46:35.859Z

Link: CVE-2025-15618

cve-icon Vulnrichment

Updated: 2026-03-31T14:42:19.803Z

cve-icon NVD

Status : Received

Published: 2026-03-31T11:16:11.950

Modified: 2026-03-31T19:16:24.007

Link: CVE-2025-15618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:15Z

Weaknesses