Description
Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.
Published: 2026-05-15
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Crypt::DSA versions up to 1.19 make use of Perl’s two‑argument open, which permits the modification of files that already exist. This flaw allows an attacker who can influence the parameters passed to the module to overwrite files such as private keys or configuration data, thereby compromising the integrity of the application or system.

Affected Systems

The affected product is TIMLEGGE’s Crypt::DSA Perl module through version 1.19. Systems running any of these versions of Crypt::DSA without an upgrade to 1.20 are vulnerable.

Risk and Exploitability

No CVSS or EPSS score is reported and the vulnerability is not listed in the CISA KEV catalog. The flaw can be exploited by an attacker who controls the environment in which Crypt::DSA operates, enabling file modifications that may impact confidentiality, integrity, or availability. The attack vector is likely local or through code that feeds input to Crypt::DSA.

Generated by OpenCVE AI on May 15, 2026 at 23:50 UTC.

Remediation

Vendor Solution

Upgrade to version 1.20


OpenCVE Recommended Actions

  • Apply the vendor’s update to Crypt::DSA 1.20
  • Limit usage of Crypt::DSA in trusted contexts and ensure that scripts cannot supply arbitrary filenames
  • Enforce strict file permissions on critical files to prevent unauthorized writes

Generated by OpenCVE AI on May 15, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 01:30:00 +0000

Type Values Removed Values Added
References

Fri, 15 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified.
Title Crypt::DSA versions through 1.19 for Perl use 2-args open, allowing existing files to be modified
Weaknesses CWE-552
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-16T00:31:20.840Z

Reserved: 2026-05-15T18:08:24.117Z

Link: CVE-2026-8704

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T23:16:21.740

Modified: 2026-05-16T01:16:17.543

Link: CVE-2026-8704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T00:00:12Z

Weaknesses