Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha.

That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18387 Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha. That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure.
Fixes

Solution

Users should upgrade to version 1.06 or later.


Workaround

No workaround given by the vendor.

History

Mon, 16 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Jun 2025 11:15:00 +0000

Type Values Removed Values Added
Description Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha. That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure.
Title Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha text
Weaknesses CWE-338
CWE-804
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-06-16T13:31:45.621Z

Reserved: 2025-04-16T09:05:34.361Z

Link: CVE-2025-40916

cve-icon Vulnrichment

Updated: 2025-06-16T13:31:28.391Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-16T11:15:17.793

Modified: 2025-06-16T14:15:22.167

Link: CVE-2025-40916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.