Description
Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts.

These versions use the built-in rand function, which is predictable and unsuitable for cryptography.
Published: 2026-05-20
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Crypt::SaltedHash supply chain generates cryptographic salts using Perl's built‑in rand function, which is designed for general‑purpose random number generation and not for cryptographic use. The predictable output means an attacker can infer or brute‑force the salt values, directly weakening hash uniqueness and enabling hash precomputation or birthday attacks. This vulnerability undermines the confidentiality and integrity of data that relies on salted hashes, such as stored password credentials, and can lead to credential theft or unauthorized access when the library is used in authentication systems.

Affected Systems

The vulnerability affects RRWO's Crypt::SaltedHash Perl module versions through 0.09, inclusive. Systems that depend on any of these versions to hash passwords, tokens, or other sensitive data are at risk.

Risk and Exploitability

No CVSS score is currently available, and the EPSS score is not disclosed, so the quantitative severity is unknown. However, the lack of a KEV listing does not diminish the potential impact for applications that use salted hashes for security. If a malicious actor can influence input to the library or gain access to the hashing process, they may predict salts and efficiently perform offline attacks against stored hashes. The vulnerability is exploitable in any environment where the module is loaded and used to create hashed credentials, making the attack vector nominally local or script‑based within the affected application.

Generated by OpenCVE AI on May 20, 2026 at 23:20 UTC.

Remediation

Vendor Solution

Upgrade to version 0.10 or later.


OpenCVE Recommended Actions

  • Upgrade Crypt::SaltedHash to version 0.10 or later, which replaces the rand function with a secure random source
  • Audit any code paths that use the Crypt::SaltedHash module to ensure it is not inadvertently feeding predictable seeds or reusing salts
  • If an immediate update is not possible, replace or patch the module to use a cryptographically secure random number generator, such as Perl's Crypt::URandom or a third‑party library

Generated by OpenCVE AI on May 20, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts. These versions use the built-in rand function, which is predictable and unsuitable for cryptography.
Title Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts
Weaknesses CWE-338
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-21T00:37:36.726Z

Reserved: 2026-05-19T16:17:52.855Z

Link: CVE-2026-47372

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-20T22:16:37.270

Modified: 2026-05-20T22:16:37.270

Link: CVE-2026-47372

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T23:30:41Z

Weaknesses