Description
WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.

The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.

The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.

Predictable session ids could allow an attacker to gain access to systems.

Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.
Published: 2026-05-11
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WebDyne::Session module for Perl creates session identifiers by hashing a value that originates from the built‑in rand() function. The rand() seed is built from the process ID, the current epoch time, and an object reference address; however, because the underlying random number generator is only 32 bits and inherently predictable, the resulting MD5 hash is also predictable. This predictable session ID generation exposes applications to session hijacking or session fixation attacks, allowing an attacker to impersonate legitimate users or gain unauthorized access to protected resources. The weakness is documented as CWE‑338 and CWE‑340, reflecting the use of an insecure pseudo‑random number generator for security purposes.

Affected Systems

Any Perl web application that incorporates the ASPEER WebDyne::Session module version 2.075 or older is affected, as is any system using WebDyne::Session versions 1.042 and earlier from the separate distribution. The vulnerability specifically targets the session‑ID generation routine in these modules.

Risk and Exploitability

The lack of a publicly available EPSS score and the absence of the vulnerability from the CISA KEV catalog indicate no known exploitation yet. Nonetheless, the deterministic nature of the identifier generator gives attackers a straightforward attack path: a remote attacker can craft or brute‑force ID values to hijack sessions or elevate privileges. While the current risk depends on an attacker’s ability to guess or brute‑force the predictable IDs, the impact of successful exploitation could be significant, affecting confidentiality, integrity, and availability of the affected web application.

Generated by OpenCVE AI on May 11, 2026 at 09:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WebDyne::Session to the latest release that replaces the insecure session‑ID generation routine.
  • Regenerate all active session identifiers after an upgrade to eliminate any previously predictable IDs.
  • Monitor authentication logs for signs of session hijacking or suspicious session ID patterns.
  • If an immediate upgrade is not possible, replace the rand()‑based ID generator with a cryptographically secure random source such as the Perl Crypt::Random module.

Generated by OpenCVE AI on May 11, 2026 at 09:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description WebDyne::Session versions through 2.075 for Perl generates the session id insecurely. The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest. The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes. Predictable session ids could allow an attacker to gain access to systems. Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.
Title WebDyne::Session versions through 2.075 for Perl generates the session id insecurely
Weaknesses CWE-338
CWE-340
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-11T06:37:19.384Z

Reserved: 2026-03-28T19:18:57.110Z

Link: CVE-2026-5084

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T08:16:16.210

Modified: 2026-05-11T08:16:16.210

Link: CVE-2026-5084

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T09:15:26Z

Weaknesses