CVE-2026-5083: Ado::Sessions versions through 0.935 for Perl generates insecure session ids
Robert Rothenberg 08 Apr 2026 05:56 UTC
========================================================================
CVE-2026-5083 CPAN Security Group
========================================================================
CVE ID: CVE-2026-5083
Distribution: Ado
Versions: through 0.935
MetaCPAN: https://metacpan.org/dist/Ado
VCS Repo: https://github.com/kberov/Ado
Ado::Sessions versions through 0.935 for Perl generates insecure
session ids
Description
-----------
Ado::Sessions versions through 0.935 for Perl generates insecure
session ids.
The session id is generated from a SHA-1 hash seeded with the built-in
rand function, the epoch time, and the PID. The PID will come from a
small set of numbers, and the epoch time may be guessed, if it is not
leaked from the HTTP Date header. The built-in rand function is
unsuitable for cryptographic usage.
Predicable session ids could allow an attacker to gain access to
systems.
Note that Ado is no longer maintained, and has been removed from the
CPAN index. It is still available on BackPAN.
Problem types
-------------
- CWE-340 Generation of Predictable Numbers or Identifiers
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
References
----------
https://github.com/kberov/Ado/issues/112
https://backpan.perl.org/authors/id/B/BE/BEROV/Ado-0.935.tar.gz
https://security.metacpan.org/docs/guides/random-data-for-security.html
Timeline
--------
- 2017-09-02: Last version of Ado was released on CPAN.
- 2018-09-24: Announcement that Ado will not be updated anymore.