Apache::SessionX versions through 2.01 for Perl create insecure session id.

Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Consider alternate solutions like https://metacpan.org/pod/Apache::SessionX::Generate::Random


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Title Apache::SessionX versions through 2.01 for Perl create insecure session id
Weaknesses CWE-338
CWE-340
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-02-26T23:33:37.083Z

Reserved: 2025-04-16T09:05:34.363Z

Link: CVE-2025-40932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T00:16:55.107

Modified: 2026-02-27T00:16:55.107

Link: CVE-2025-40932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses