WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution
Summary
| CVE | CVE-2026-8612 |
|---|---|
| State | PUBLISHED |
| Assigner | CPANSec |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-15 02:16:23 UTC |
| Updated | 2026-05-15 06:16:20 UTC |
| Description | WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution. With no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend's documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit. A local attacker with write access to the cache tree can replace a victim's cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim's next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution. |
Risk And Classification
Problem Types: CWE-502 | CWE-732 | CWE-732 CWE-732 Incorrect Permission Assignment for Critical Resource | CWE-502 CWE-502 Deserialization of Untrusted Data
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | OALDERS | WWWMechanizeCached | affected 2.00 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/libwww-perl/WWW-Mechanize-Cached/pull/36 | 9b29abf9-4ab0-4765-b253-1875cd9b441e | github.com | |
| www.openwall.com/lists/oss-security/2026/05/15/1 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| github.com/libwww-perl/WWW-Mechanize-Cached/commit/b821647deeedf83490ebc... | 9b29abf9-4ab0-4765-b253-1875cd9b441e | github.com | |
| metacpan.org/release/OALDERS/WWW-Mechanize-Cached-2.00/changes | 9b29abf9-4ab0-4765-b253-1875cd9b441e | metacpan.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-05-13T00:00:00.000Z | Issue reported. |
| CNA | 2026-05-14T00:00:00.000Z | WWW-Mechanize-Cached 2.00 released with fix. |
Solutions
CNA: Upgrade to WWW-Mechanize-Cached 2.00 or later.
There are currently no legacy QID mappings associated with this CVE.