CVE-2025-40932: Apache::SessionX versions through 2.01 for Perl create insecure session id
Timothy Legge 26 Feb 2026 23:34 UTC
========================================================================
CVE-2025-40932 CPAN Security Group
========================================================================
CVE ID: CVE-2025-40932
Distribution: Apache-SessionX
Versions: through 2.01
MetaCPAN: https://metacpan.org/dist/Apache-SessionX
Apache::SessionX versions through 2.01 for Perl create insecure session
id
Description
-----------
Apache::SessionX versions through 2.01 for Perl create insecure session
id.
Apache::SessionX generates session ids insecurely. The default session
id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash
seeded with the built-in rand() function, the epoch time, and the PID.
The PID will come from a small set of numbers, and the epoch time may
be guessed, if it is not leaked from the HTTP Date header. The built-in
rand function is unsuitable for cryptographic usage. Predicable session
ids could allow an attacker to gain access to systems.
Problem types
-------------
- CWE-340 Generation of Predictable Numbers or Identifiers
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
Solutions
---------
Consider alternate solutions like
https://metacpan.org/pod/Apache::SessionX::Generate::Random
References
----------
https://metacpan.org/release/GRICHTER/Apache-SessionX-2.01/source/SessionX/Generate/MD5.pm#L29
Credits
-------
Robert Rothenberg, finder