{"api_version":"1","generated_at":"2026-05-11T11:04:36+00:00","cve":"CVE-2026-45179","urls":{"html":"https://cve.report/CVE-2026-45179","api":"https://cve.report/api/cve/CVE-2026-45179.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-45179","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-45179"},"summary":{"title":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses","description":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses.\n\nIf the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked.\n\nSince version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-05-10 20:16:28","updated_at":"2026-05-10 22:16:06"},"problem_types":["CWE-319","CWE-319 CWE-319 Cleartext Transmission of Sensitive Information"],"metrics":[],"references":[{"url":"https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx","name":"https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/05/10/4","name":"http://www.openwall.com/lists/oss-security/2026/05/10/4","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://metacpan.org/release/RRWO/Plack-Middleware-Statsd-v0.9.0/changes","name":"https://metacpan.org/release/RRWO/Plack-Middleware-Statsd-v0.9.0/changes","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-45179","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-45179","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"RRWO","product":"Plack::Middleware::Statsd","version":"affected 0.9.0 custom","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to version 0.9.0 or later.","time":"","lang":"en"}],"workarounds":[{"source":"CNA","title":"","value":"Use a statsd daemon on the same host or through a secure communications channel.","time":"","lang":"en"}],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-05-10T21:17:03.221Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/10/4"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"Plack-Middleware-Statsd","product":"Plack::Middleware::Statsd","repo":"https://github.com/robrwo/Plack-Middleware-Statsd","vendor":"RRWO","versions":[{"lessThan":"0.9.0","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses.\n\nIf the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked.\n\nSince version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319 Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-10T19:10:57.492Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"tags":["vendor-advisory"],"url":"https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx"},{"tags":["release-notes"],"url":"https://metacpan.org/release/RRWO/Plack-Middleware-Statsd-v0.9.0/changes"}],"solutions":[{"lang":"en","value":"Upgrade to version 0.9.0 or later."}],"source":{"discovery":"UNKNOWN"},"title":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses","workarounds":[{"lang":"en","value":"Use a statsd daemon on the same host or through a secure communications channel."}],"x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-45179","datePublished":"2026-05-10T19:10:57.492Z","dateReserved":"2026-05-09T18:57:17.867Z","dateUpdated":"2026-05-10T21:17:03.221Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-10 20:16:28","lastModifiedDate":"2026-05-10 22:16:06","problem_types":["CWE-319","CWE-319 CWE-319 Cleartext Transmission of Sensitive Information"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"45179","Ordinal":"1","Title":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may lea","CVE":"CVE-2026-45179","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"45179","Ordinal":"1","NoteData":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses.\n\nIf the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked.\n\nSince version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead.","Type":"Description","Title":"Plack::Middleware::Statsd versions before 0.9.0 for Perl may lea"}]}}}