Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-40932
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2026 | 23:33
Updated At-27 Feb, 2026 | 18:41
Rejected At-
▼CVE Numbering Authority (CNA)
Apache::SessionX versions through 2.01 for Perl create insecure session id

Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.

Affected Products
Vendor
GRICHTER
Product
Apache::SessionX
Collection URL
https://cpan.org/modules
Package Name
Apache-SessionX
Program Files
  • lib/SessionX/Generate/MD5.pm
Default Status
unaffected
Versions
Affected
  • From 0 through 2.01 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-340CWE-340 Generation of Predictable Numbers or Identifiers
CWECWE-338CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
Type: CWE
CWE ID: CWE-340
Description: CWE-340 Generation of Predictable Numbers or Identifiers
Type: CWE
CWE ID: CWE-338
Description: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-115CAPEC-115 Authentication Bypass
CAPEC ID: CAPEC-115
Description: CAPEC-115 Authentication Bypass
Solutions

Consider alternate solutions like https://metacpan.org/pod/Apache::SessionX::Generate::Random

Configurations

Workarounds

Exploits

Credits

finder
Robert Rothenberg
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/release/GRICHTER/Apache-SessionX-2.01/source/SessionX/Generate/MD5.pm#L29
related
Hyperlink: https://metacpan.org/release/GRICHTER/Apache-SessionX-2.01/source/SessionX/Generate/MD5.pm#L29
Resource:
related
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found