CVE-2025-3051: Linux::Statm::Tiny for Perl allows untrusted code to be included from the current working directory Stig Palmquist 01 Apr 2025 02:22 UTC

========================================================================
CVE-2025-3051                                        CPAN Security Group
========================================================================

         CVE ID:  CVE-2025-3051
   Distribution:  Linux-Statm-Tiny
       Versions:  before 0.0701

       MetaCPAN:  https://metacpan.org/dist/Linux-Statm-Tiny
       VCS Repo:  https://github.com/robrwo/Linux-Statm-Tiny

Linux::Statm::Tiny for Perl allows untrusted code to be included from
the current working directory

Description
-----------
Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from
the current working directory ('.') to be loaded similar to
CVE-2016-1238.

If an attacker can place a malicious file in current working directory,
it may be loaded instead of the intended file, potentially leading to
arbitrary code execution.

Linux::Statm::Tiny uses Mite to produce the affected code section due
to CVE-2025-30672

Problem types
-------------
CWE-427 Uncontrolled Search Path Element

Impacts
-------
CAPEC-38 Leveraging/Manipulating Configuration File Search Paths

Mitigations
-----------
Version 0.0701 of Linux::Statm::Tiny was released to address the issue.
Users should update to the latest version.

References
----------
https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes
https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82
https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html