CVE-2026-46473

Published: Mag 21, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand.

Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

331

Insufficient Entropy

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Bypass Protection Mechanism Other
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/tchatzi/Authen-TOTP/commit/d04f30cc6538d77fc6b6d550da450cf30…
https://metacpan.org/release/TCHATZI/Authen-TOTP-0.1.1/changes