Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
History

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Grichter
Grichter apache::sessionx
Vendors & Products Grichter
Grichter apache::sessionx

Fri, 27 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Title Apache::SessionX versions through 2.01 for Perl create insecure session id
Weaknesses CWE-338
CWE-340
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2026-02-26T23:33:37.083Z

Updated: 2026-02-26T23:33:37.083Z

Reserved: 2025-04-16T09:05:34.363Z

Link: CVE-2025-40932

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T00:16:55.107

Modified: 2026-02-27T00:16:55.107

Link: CVE-2025-40932

cve-icon Redhat

No data.