๐Ÿ” CVE Alert

CVE-2026-7381

UNKNOWN 0.0

Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment. A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server. Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack. This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.

CWE CWE-200 CWE-441 CWE-913
Vendor miyagawa
Product plack::middleware::xsendfile
Published Apr 29, 2026
Stay Ahead of the Next One

Get instant alerts for miyagawa plack::middleware::xsendfile

Be the first to know when new unknown vulnerabilities affecting miyagawa plack::middleware::xsendfile are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MIYAGAWA / Plack::Middleware::XSendfile
0 โ‰ค 1.0053

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metacpan.org: https://metacpan.org/release/MIYAGAWA/Plack-1.0053/changes metacpan.org: https://metacpan.org/release/MIYAGAWA/Plack-1.0053/view/lib/Plack/Middleware/XSendfile.pm#DEPRECATION-NOTICE nvd.nist.gov: https://nvd.nist.gov/vuln/detail/CVE-2025-61780

Credits

CPANSec