๐Ÿ” CVE Alert

CVE-2026-5084

MEDIUM 6.5

WebDyne::Session versions through 2.075 for Perl generates the session id insecurely

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

WebDyne::Session versions through 2.075 for Perl generates the session id insecurely. The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest. The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes. Predictable session ids could allow an attacker to gain access to systems. Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.

CWE CWE-340 CWE-338
Vendor aspeer
Product webdyne::session
Published May 11, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for aspeer webdyne::session

Be the first to know when new medium vulnerabilities affecting aspeer webdyne::session are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ASPEER / WebDyne::Session
0 โ‰ค 2.075

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metacpan.org: https://metacpan.org/release/ASPEER/WebDyne-2.075/source/lib/WebDyne/Session.pm#L120 webdyne.org: https://webdyne.org security.metacpan.org: https://security.metacpan.org/docs/guides/random-data-for-security.html openwall.com: http://www.openwall.com/lists/oss-security/2026/05/11/3