Description
Net::Statsd::Lite versions through 0.10.0 for Perl allowed metric injections.

The values from the set_add method were not checked for newlines, colons or pipes. Metrics generated from untrusted sources could inject additional statsd metrics.

Note that version 0.9.0 fixed a similar issue CVE-2026-46719 for metric names.
Published: 2026-05-18
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Net::Statsd::Lite versions up to 0.10.0 allow metrics generated from untrusted input to contain newlines, colons or pipes because the set_add method does not validate these characters. An attacker can embed malicious metric definitions that the Statsd server interprets as additional metrics, resulting in data corruption, misleading dashboards, false alerts or automated actions based on the tampered data. This flaw is classified as CWE‑93 – Injection via Data Manipulation.

Affected Systems

The vulnerable component is the Perl module Net::Statsd::Lite supplied by RRWO. All releases of 0.10.0 and earlier are susceptible. The 0.9.0 release addressed a separate metric‑name injection issue; however, the value‑based injection problem persists through 0.10.0.

Risk and Exploitability

The CVSS score is not specified and the EPSS score is unavailable, making it hard to quantify the exact likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack vector is any channel that feeds untrusted data to the set_add method, allowing an attacker to embed unwanted metric definitions. The impact is limited to integrity of monitoring data and potential operational disruption, without granting code execution or system compromise.

Generated by OpenCVE AI on May 18, 2026 at 09:51 UTC.

Remediation

Vendor Solution

Upgrade to Net::Statsd::Lite version 0.10.1 or later.


Vendor Workaround

In version 0.10.0, use the secure_set_add method which logs an HMAC digest of the value instead of the raw value. Validate that all values sent to the client based on untrusted data do not contain metric injections.


OpenCVE Recommended Actions

  • Upgrade Net::Statsd::Lite to version 0.10.1 or later to remove the injection flaw.
  • If an upgrade cannot be performed immediately, use the secure_set_add method in version 0.10.0 which records an HMAC digest of the value instead of the raw value, thereby preventing injection of additional metrics.
  • Implement input validation in the calling code to reject metric values containing newline, colon or pipe characters, ensuring only allowed characters reach the set_add method.

Generated by OpenCVE AI on May 18, 2026 at 09:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rrwo
Rrwo net::statsd::lite
Vendors & Products Rrwo
Rrwo net::statsd::lite

Mon, 18 May 2026 08:00:00 +0000

Type Values Removed Values Added
Description Net::Statsd::Lite versions through 0.10.0 for Perl allowed metric injections. The values from the set_add method were not checked for newlines, colons or pipes. Metrics generated from untrusted sources could inject additional statsd metrics. Note that version 0.9.0 fixed a similar issue CVE-2026-46719 for metric names.
Title Net::Statsd::Lite versions through 0.10.0 for Perl allowed metric injections
Weaknesses CWE-93
References

Subscriptions

Rrwo Net::statsd::lite
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-18T06:34:24.030Z

Reserved: 2026-05-17T12:01:20.592Z

Link: CVE-2026-8788

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T08:16:15.320

Modified: 2026-05-18T08:16:15.320

Link: CVE-2026-8788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:00:13Z

Weaknesses