CVE-2025-40931 PUBLISHED

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id

Assigner: CPANSec
Reserved: 16.04.2025 Published: 05.03.2026 Updated: 05.03.2026

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id.

Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Product Status

Vendor CHORNY
Product Apache::Session::Generate::MD5
Versions Default: unaffected
  • affected from 0 to 1.94 (incl.)

Solutions

Consider alternate solutions like https://metacpan.org/pod/Apache::Session::Generate::Random

Credits

  • Robert Rothenberg finder

References

Problem Types

  • CWE-340 Generation of Predictable Numbers or Identifiers CWE
  • CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator CWE

Impacts

  • CAPEC-115 Authentication Bypass