Apache::SessionX versions through 2.01 for Perl create insecure session id.

Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Project Subscriptions

Vendors Products
Grichter Subscribe
Apache::sessionx Subscribe
Advisories

No advisories yet.

Fixes

Solution

Consider alternate solutions like https://metacpan.org/pod/Apache::SessionX::Generate::Random


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Grichter
Grichter apache::sessionx
Vendors & Products Grichter
Grichter apache::sessionx

Fri, 27 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Title Apache::SessionX versions through 2.01 for Perl create insecure session id
Weaknesses CWE-338
CWE-340
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-02-27T18:41:24.407Z

Reserved: 2025-04-16T09:05:34.363Z

Link: CVE-2025-40932

cve-icon Vulnrichment

Updated: 2026-02-27T18:39:45.874Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-27T00:16:55.107

Modified: 2026-02-27T19:16:04.780

Link: CVE-2025-40932

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-27T09:03:33Z

Weaknesses