๐Ÿ” CVE Alert

CVE-2026-8612

UNKNOWN 0.0

WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution. With no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend's documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit. A local attacker with write access to the cache tree can replace a victim's cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim's next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution.

CWE CWE-732 CWE-502
Vendor oalders
Product www::mechanize::cached
Published May 15, 2026
Stay Ahead of the Next One

Get instant alerts for oalders www::mechanize::cached

Be the first to know when new unknown vulnerabilities affecting oalders www::mechanize::cached are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OALDERS / WWW::Mechanize::Cached
0 < 2.00

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/libwww-perl/WWW-Mechanize-Cached/pull/36 github.com: https://github.com/libwww-perl/WWW-Mechanize-Cached/commit/b821647deeedf83490ebc1db91d959d942300ce0.patch metacpan.org: https://metacpan.org/release/OALDERS/WWW-Mechanize-Cached-2.00/changes