PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely.

PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications.

This modules does not use the Crypt::URandom module, and installing it will not fix the problem.

The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie.

A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.

Project Subscriptions

Vendors Products
Jjnapiork Subscribe
Pagi::middleware::session::store::cookie Subscribe
Advisories

No advisories yet.

Fixes

Solution

Upgrade to version 0.001004 or newer.


Workaround

No workaround given by the vendor.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Jjnapiork
Jjnapiork pagi::middleware::session::store::cookie
Vendors & Products Jjnapiork
Jjnapiork pagi::middleware::session::store::cookie
References

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely. PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications. This modules does not use the Crypt::URandom module, and installing it will not fix the problem. The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie. A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.
Title PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely
Weaknesses CWE-1204
CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-04-01T14:43:35.295Z

Reserved: 2026-03-28T19:29:58.433Z

Link: CVE-2026-5087

cve-icon Vulnrichment

Updated: 2026-03-31T18:18:48.427Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T16:16:35.080

Modified: 2026-04-01T16:23:52.180

Link: CVE-2026-5087

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:53:16Z

Weaknesses