CVE-2026-45180 PUBLISHED

Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids

Assigner: CPANSec
Reserved: 09.05.2026 Published: 10.05.2026 Updated: 10.05.2026

Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids.

If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.

Product Status

Vendor RRWO
Product Catalyst::Plugin::Statsd
Versions Default: unaffected
  • affected from 0 to 0.10.0 (incl.)

Workarounds

Use a statsd daemon on the same host or through a secure communications channel.

Solutions

Upgrade to version 0.10.0 of later, which will no longer log session ids to statsd.

If Plack::Middleware::Statsd is upgraded to 0.9.0 or later and is configured to log some information securely, then session ids will be logged as HMAC signatures instead.

References

Problem Types

  • CWE-319 Cleartext Transmission of Sensitive Information CWE

Impacts

  • CAPEC-102 Session Sidejacking