CVE-2026-5084

Published: Mag 11, 2026 Last Modified: Mag 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.

The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.

The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.

Predictable session ids could allow an attacker to gain access to systems.

Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.

338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Draft
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
340

Generation of Predictable Numbers or Identifiers

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
All platforms may be affected
View CWE Details
https://metacpan.org/release/ASPEER/WebDyne-2.075/source/lib/WebDyne/Session.pm…
https://security.metacpan.org/docs/guides/random-data-for-security.html
https://webdyne.org