๐Ÿ” CVE Alert

CVE-2018-25160

MEDIUM 6.5

HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend. For example, if an application uses memcached for session storage, then it may be possible for a remote attacker to inject memcached commands in the session id value.

CWE CWE-20
Vendor tokuhirom
Product http::session2
Published Feb 27, 2026
Last Updated Mar 3, 2026
Stay Ahead of the Next One

Get instant alerts for tokuhirom http::session2

Be the first to know when new medium vulnerabilities affecting tokuhirom http::session2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

TOKUHIROM / HTTP::Session2
0 โ‰ค 1.09

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d.patch metacpan.org: https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.10/source/Changes metacpan.org: https://metacpan.org/pod/Cache::Memcached::Fast::Safe openwall.com: http://www.openwall.com/lists/oss-security/2026/02/27/13