{"api_version":"1","generated_at":"2026-05-11T11:03:19+00:00","cve":"CVE-2026-5084","urls":{"html":"https://cve.report/CVE-2026-5084","api":"https://cve.report/api/cve/CVE-2026-5084.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5084","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5084"},"summary":{"title":"WebDyne::Session versions through 2.075 for Perl generates the session id insecurely","description":"WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.\n\nThe session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.\n\nThe rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.\n\nPredictable session ids could allow an attacker to gain access to systems.\n\nNote that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-05-11 08:16:16","updated_at":"2026-05-11 08:16:16"},"problem_types":["CWE-338","CWE-340","CWE-340 CWE-340 Generation of Predictable Numbers or Identifiers","CWE-338 CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator"],"metrics":[],"references":[{"url":"https://metacpan.org/release/ASPEER/WebDyne-2.075/source/lib/WebDyne/Session.pm#L120","name":"https://metacpan.org/release/ASPEER/WebDyne-2.075/source/lib/WebDyne/Session.pm#L120","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://webdyne.org","name":"https://webdyne.org","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security.metacpan.org/docs/guides/random-data-for-security.html","name":"https://security.metacpan.org/docs/guides/random-data-for-security.html","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5084","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5084","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"ASPEER","product":"WebDyne::Session","version":"affected 2.075 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"WebDyne","product":"WebDyne::Session","programFiles":["lib/WebDyne/Session.pm"],"programRoutines":[{"name":"WebDyne::Session::handler"}],"repo":"https://github.com/aspeer/WebDyne","vendor":"ASPEER","versions":[{"lessThanOrEqual":"2.075","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.\n\nThe session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.\n\nThe rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.\n\nPredictable session ids could allow an attacker to gain access to systems.\n\nNote that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne."}],"impacts":[{"capecId":"CAPEC-102","descriptions":[{"lang":"en","value":"CAPEC-102 Session Sidejacking"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-340","description":"CWE-340 Generation of Predictable Numbers or Identifiers","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-338","description":"CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-11T06:37:19.384Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"url":"https://metacpan.org/release/ASPEER/WebDyne-2.075/source/lib/WebDyne/Session.pm#L120"},{"url":"https://webdyne.org"},{"tags":["technical-description"],"url":"https://security.metacpan.org/docs/guides/random-data-for-security.html"}],"source":{"discovery":"UNKNOWN"},"title":"WebDyne::Session versions through 2.075 for Perl generates the session id insecurely","x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-5084","datePublished":"2026-05-11T06:37:19.384Z","dateReserved":"2026-03-28T19:18:57.110Z","dateUpdated":"2026-05-11T06:37:19.384Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-11 08:16:16","lastModifiedDate":"2026-05-11 08:16:16","problem_types":["CWE-338","CWE-340","CWE-340 CWE-340 Generation of Predictable Numbers or Identifiers","CWE-338 CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5084","Ordinal":"1","Title":"WebDyne::Session versions through 2.075 for Perl generates the s","CVE":"CVE-2026-5084","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5084","Ordinal":"1","NoteData":"WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.\n\nThe session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.\n\nThe rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.\n\nPredictable session ids could allow an attacker to gain access to systems.\n\nNote that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.","Type":"Description","Title":"WebDyne::Session versions through 2.075 for Perl generates the s"}]}}}