{"api_version":"1","generated_at":"2026-05-15T11:35:46+00:00","cve":"CVE-2026-8612","urls":{"html":"https://cve.report/CVE-2026-8612","api":"https://cve.report/api/cve/CVE-2026-8612.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-8612","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-8612"},"summary":{"title":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution","description":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution.\n\nWith no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend's documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit.\n\nA local attacker with write access to the cache tree can replace a victim's cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim's next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-05-15 02:16:23","updated_at":"2026-05-15 06:16:20"},"problem_types":["CWE-502","CWE-732","CWE-732 CWE-732 Incorrect Permission Assignment for Critical Resource","CWE-502 CWE-502 Deserialization of Untrusted Data"],"metrics":[],"references":[{"url":"https://github.com/libwww-perl/WWW-Mechanize-Cached/pull/36","name":"https://github.com/libwww-perl/WWW-Mechanize-Cached/pull/36","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/05/15/1","name":"http://www.openwall.com/lists/oss-security/2026/05/15/1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/libwww-perl/WWW-Mechanize-Cached/commit/b821647deeedf83490ebc1db91d959d942300ce0.patch","name":"https://github.com/libwww-perl/WWW-Mechanize-Cached/commit/b821647deeedf83490ebc1db91d959d942300ce0.patch","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://metacpan.org/release/OALDERS/WWW-Mechanize-Cached-2.00/changes","name":"https://metacpan.org/release/OALDERS/WWW-Mechanize-Cached-2.00/changes","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-8612","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-8612","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"OALDERS","product":"WWW::Mechanize::Cached","version":"affected 2.00 custom","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-05-13T00:00:00.000Z","lang":"en","value":"Issue reported."},{"source":"CNA","time":"2026-05-14T00:00:00.000Z","lang":"en","value":"WWW-Mechanize-Cached 2.00 released with fix."}],"solutions":[{"source":"CNA","title":"","value":"Upgrade to WWW-Mechanize-Cached 2.00 or later.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-05-15T05:18:42.682Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/15/1"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"WWW-Mechanize-Cached","product":"WWW::Mechanize::Cached","programFiles":["lib/WWW/Mechanize/Cached.pm"],"programRoutines":[{"name":"WWW::Mechanize::Cached::_build_cache"},{"name":"WWW::Mechanize::Cached::_make_request"}],"repo":"https://github.com/libwww-perl/WWW-Mechanize-Cached","vendor":"OALDERS","versions":[{"lessThan":"2.00","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution.\n\nWith no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend's documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit.\n\nA local attacker with write access to the cache tree can replace a victim's cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim's next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-732","description":"CWE-732 Incorrect Permission Assignment for Critical Resource","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-15T01:11:55.018Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"tags":["patch"],"url":"https://github.com/libwww-perl/WWW-Mechanize-Cached/pull/36"},{"tags":["patch"],"url":"https://github.com/libwww-perl/WWW-Mechanize-Cached/commit/b821647deeedf83490ebc1db91d959d942300ce0.patch"},{"tags":["release-notes"],"url":"https://metacpan.org/release/OALDERS/WWW-Mechanize-Cached-2.00/changes"}],"solutions":[{"lang":"en","value":"Upgrade to WWW-Mechanize-Cached 2.00 or later."}],"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2026-05-13T00:00:00.000Z","value":"Issue reported."},{"lang":"en","time":"2026-05-14T00:00:00.000Z","value":"WWW-Mechanize-Cached 2.00 released with fix."}],"title":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution","x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-8612","datePublished":"2026-05-15T01:11:55.018Z","dateReserved":"2026-05-14T16:30:23.954Z","dateUpdated":"2026-05-15T05:18:42.682Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-15 02:16:23","lastModifiedDate":"2026-05-15 06:16:20","problem_types":["CWE-502","CWE-732","CWE-732 CWE-732 Incorrect Permission Assignment for Critical Resource","CWE-502 CWE-502 Deserialization of Untrusted Data"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"8612","Ordinal":"1","Title":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize","CVE":"CVE-2026-8612","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"8612","Ordinal":"1","NoteData":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution.\n\nWith no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend's documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit.\n\nA local attacker with write access to the cache tree can replace a victim's cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim's next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution.","Type":"Description","Title":"WWW::Mechanize::Cached versions before 2.00 for Perl deserialize"}]}}}