CVE-2026-5081: Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are insecure
Robert Rothenberg 06 May 2026 12:19 UTC
========================================================================
CVE-2026-5081 CPAN Security Group
========================================================================
CVE ID: CVE-2026-5081
Distribution: Apache-Session
Versions: from 1.54 through 1.94
MetaCPAN: https://metacpan.org/dist/Apache-Session
VCS Repo: http://github.com/chorny/Apache-Session
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94
for Perl session ids are insecure
Description
-----------
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94
for Perl session ids are insecure.
Apache::Session::Generate::ModUniqueId (added in version 1.54) uses the
value of the UNIQUE_ID environment variable for the session id. The
UNIQUE_ID variable is set by the Apache mod_unique_id plugin, which
generates unique ids for the request. The id is based on the IPv4
address, the process id, the epoch time, a 16-bit counter and a thread
index, with no obfuscation.
The server IP is often available to the public, and if not available,
can be guessed from previous session ids being issued. The process ids
may also be guessed from previous session ids. The timestamp is easily
guessed (and leaked in the HTTP Date response header).
The purpose of mod_unique_id is to assign a unique id to requests so
that events can be correlated in different logs. The id is not
designed, nor is it suitable for security purposes.
Problem types
-------------
- CWE-340 Generation of Predictable Numbers or Identifiers
Solutions
---------
In cases where the session id is used for authentication or provides
access to restricted data, consider alternate solutions like
Apache::Session::Generate::Random.
References
----------
https://httpd.apache.org/docs/current/mod/mod_unique_id.html
https://metacpan.org/pod/Apache::Session::Generate::Random