Apache::Session::Generate::SHA256 generated session ids insecurely. The default session id generator returns a SHA-256 hash of the built-in rand() function, the epoch time, and the PID, that is hashed again. These are predictable, low-entropy sources. Predicable session ids could allow an attacker to gain access to systems.
Note that version 1.3.19 has a fallback without warning to use insecure session generation method if the call to Crypt::URandom::urandom fails. However, this is unlikely as Crypt::URandom is a hardcoded requirement of the module.
This issue is similar to CVE-2025-40931 for Apache::Session::Generate::MD5.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Upgrade to version 1.3.19 or later.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 15 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids. Apache::Session::Generate::SHA256 generated session ids insecurely. The default session id generator returns a SHA-256 hash of the built-in rand() function, the epoch time, and the PID, that is hashed again. These are predictable, low-entropy sources. Predicable session ids could allow an attacker to gain access to systems. Note that version 1.3.19 has a fallback without warning to use insecure session generation method if the call to Crypt::URandom::urandom fails. However, this is unlikely as Crypt::URandom is a hardcoded requirement of the module. This issue is similar to CVE-2025-40931 for Apache::Session::Generate::MD5. | |
| Title | Apache::Session::Generate::SHA256 versions before 1.3.19 for Perl create insecure session ids | |
| Weaknesses | CWE-338 CWE-340 |
|
| References |
|
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-15T15:37:28.791Z
Reserved: 2026-05-13T21:07:03.760Z
Link: CVE-2026-8503
Updated: 2026-05-15T15:37:23.025Z
Status : Awaiting Analysis
Published: 2026-05-15T12:17:09.557
Modified: 2026-05-15T16:16:15.550
Link: CVE-2026-8503
No data.
OpenCVE Enrichment
Updated: 2026-05-15T17:45:04Z