CVE-2026-2439 PUBLISHED

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids

Assigner: CPANSec
Reserved: 12.02.2026 Published: 16.02.2026 Updated: 17.02.2026

Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's built-in rand function. Neither of these methods are secure, and attackers are able to guess session_ids that can grant them access to systems. Specifically,

  • There is no warning when uuidgen fails. The software can be quietly using the fallback rand() function with no warnings if the command fails for any reason.
  • The uuidgen command will generate a time-based UUID if the system does not have a high-quality random number source, because the call does not explicitly specify the --random option. Note that the system time is shared in HTTP responses.
  • UUIDs are identifiers whose mere possession grants access, as per RFC 9562.
  • The output of the built-in rand() function is predictable and unsuitable for security applications.

Product Status

Vendor BVA
Product Concierge::Sessions
Versions Default: unaffected
  • affected from 0.8.1 to 0.8.5 (excl.)

Solutions

Upgrade to Concierge::Sessions v0.8.5 or later.

Credits

  • Robert Rothenberg finder

References

Problem Types

  • CWE-340 Generation of Predictable Numbers or Identifiers CWE
  • CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) CWE

Impacts

  • CAPEC-115 Authentication Bypass