๐Ÿ” CVE Alert

CVE-2026-5085

CRITICAL 9.1

Solstice::Session versions through 1440 for Perl generates session ids insecurely

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
4th

Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers. Predictable session ids could allow an attacker to gain access to systems.

CWE CWE-340 CWE-338
Vendor mcrawfor
Product solstice::session
Published Apr 13, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mcrawfor solstice::session

Be the first to know when new critical vulnerabilities affecting mcrawfor solstice::session are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MCRAWFOR / Solstice::Session
0 โ‰ค 1440

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metacpan.org: https://metacpan.org/dist/Solstice/source/lib/Solstice/Session.pm#L481 metacpan.org: https://metacpan.org/dist/Solstice/source/lib/Solstice/Subsession.pm#L105 security.metacpan.org: https://security.metacpan.org/docs/guides/random-data-for-security.html openwall.com: http://www.openwall.com/lists/oss-security/2026/04/13/2