That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure.
No analysis available yet.
Vendor Solution
Users should upgrade to version 1.06 or later.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18387 | Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha. That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure. |
Mon, 16 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 16 Jun 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha. That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure. | |
| Title | Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha text | |
| Weaknesses | CWE-338 CWE-804 |
|
| References |
|
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2025-06-16T13:31:45.621Z
Reserved: 2025-04-16T09:05:34.361Z
Link: CVE-2025-40916
Updated: 2025-06-16T13:31:28.391Z
Status : Deferred
Published: 2025-06-16T11:15:17.793
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-40916
No data.
OpenCVE Enrichment
No data.
EUVD