Apache::SessionX versions through 2.01 for Perl create insecure session id.
Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Consider alternate solutions like https://metacpan.org/pod/Apache::SessionX::Generate::Random
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Grichter
Grichter apache::sessionx |
|
| Vendors & Products |
Grichter
Grichter apache::sessionx |
Fri, 27 Feb 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. | |
| Title | Apache::SessionX versions through 2.01 for Perl create insecure session id | |
| Weaknesses | CWE-338 CWE-340 |
|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-02-26T23:33:37.083Z
Reserved: 2025-04-16T09:05:34.363Z
Link: CVE-2025-40932
No data.
Status : Awaiting Analysis
Published: 2026-02-27T00:16:55.107
Modified: 2026-02-27T14:06:37.987
Link: CVE-2025-40932
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:03:33Z