๐Ÿ” CVE Alert

CVE-2026-45180

HIGH 7.5

Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
9th

Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.

CWE CWE-319
Vendor rrwo
Product catalyst::plugin::statsd
Published May 10, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for rrwo catalyst::plugin::statsd

Be the first to know when new high vulnerabilities affecting rrwo catalyst::plugin::statsd are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

RRWO / Catalyst::Plugin::Statsd
0 โ‰ค 0.10.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/robrwo/CatalystX-Statsd/security/advisories/GHSA-gjvr-hq83-fc38 metacpan.org: https://metacpan.org/release/RRWO/Catalyst-Plugin-Statsd-v0.10.0/changes cve.org: https://www.cve.org/CVERecord?id=CVE-2026-45179 github.com: https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx