Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution.

Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Upgrade Plack::Middleware::Session to version 0.23 or later (ideally version 0.36 or later), and set the "secret" option.


Workaround

Set the "secret" option.

History

Thu, 26 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
References

Thu, 26 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution. Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.
Title Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution
Weaknesses CWE-565
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-26T04:46:57.862Z

Reserved: 2025-07-08T15:24:38.840Z

Link: CVE-2014-125112

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T03:16:00.423

Modified: 2026-03-26T05:16:33.267

Link: CVE-2014-125112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses