CVE-2018-25160
HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend. For example, if an application uses memcached for session storage, then it may be possible for a remote attacker to inject memcached commands in the session id value.
| CWE | CWE-20 |
| Vendor | tokuhirom |
| Product | http::session2 |
| Published | Feb 27, 2026 |
| Last Updated | Mar 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for tokuhirom http::session2
Be the first to know when new medium vulnerabilities affecting tokuhirom http::session2 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
TOKUHIROM / HTTP::Session2
0 โค 1.09
References
github.com: https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d.patch metacpan.org: https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.10/source/Changes metacpan.org: https://metacpan.org/pod/Cache::Memcached::Fast::Safe openwall.com: http://www.openwall.com/lists/oss-security/2026/02/27/13