CVE-2026-45180
Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
9th
Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.
| CWE | CWE-319 |
| Vendor | rrwo |
| Product | catalyst::plugin::statsd |
| Published | May 10, 2026 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for rrwo catalyst::plugin::statsd
Be the first to know when new high vulnerabilities affecting rrwo catalyst::plugin::statsd are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
RRWO / Catalyst::Plugin::Statsd
0 โค 0.10.0
References
github.com: https://github.com/robrwo/CatalystX-Statsd/security/advisories/GHSA-gjvr-hq83-fc38 metacpan.org: https://metacpan.org/release/RRWO/Catalyst-Plugin-Statsd-v0.10.0/changes cve.org: https://www.cve.org/CVERecord?id=CVE-2026-45179 github.com: https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx