CVE-2025-40932 PUBLISHED

Apache::SessionX versions through 2.01 for Perl create insecure session id

Assigner: CPANSec
Reserved: 16.04.2025 Published: 26.02.2026 Updated: 26.02.2026

Apache::SessionX versions through 2.01 for Perl create insecure session id.

Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Product Status

Vendor GRICHTER
Product Apache::SessionX
Versions Default: unaffected
  • affected from 0 to 2.01 (incl.)

Solutions

Consider alternate solutions like https://metacpan.org/pod/Apache::SessionX::Generate::Random

Credits

  • Robert Rothenberg finder

References

Problem Types

  • CWE-340 Generation of Predictable Numbers or Identifiers CWE
  • CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator CWE

Impacts

  • CAPEC-115 Authentication Bypass