Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids
Summary
| CVE | CVE-2026-45180 |
|---|---|
| State | PUBLISHED |
| Assigner | CPANSec |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-10 21:16:29 UTC |
| Updated | 2026-05-10 21:16:29 UTC |
| Description | Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens. |
Risk And Classification
Problem Types: CWE-319 | CWE-319 CWE-319 Cleartext Transmission of Sensitive Information
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | RRWO | CatalystPluginStatsd | affected 0.10.0 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-... | 9b29abf9-4ab0-4765-b253-1875cd9b441e | github.com | |
| metacpan.org/release/RRWO/Catalyst-Plugin-Statsd-v0.10.0/changes | 9b29abf9-4ab0-4765-b253-1875cd9b441e | metacpan.org | |
| github.com/robrwo/CatalystX-Statsd/security/advisories/GHSA-gjvr-hq83-fc38 | 9b29abf9-4ab0-4765-b253-1875cd9b441e | github.com | |
| www.cve.org/CVERecord | 9b29abf9-4ab0-4765-b253-1875cd9b441e | www.cve.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
Solutions
CNA: Upgrade to version 0.10.0 of later, which will no longer log session ids to statsd. If Plack::Middleware::Statsd is upgraded to 0.9.0 or later and is configured to log some information securely, then session ids will be logged as HMAC signatures instead.
Workarounds
CNA: Use a statsd daemon on the same host or through a secure communications channel.
There are currently no legacy QID mappings associated with this CVE.