CVE-2025-40905

WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dbook:www\:\:oauth:*:*:*:*:*:perl:*:*

History

10 Mar 2026, 17:07

Type Values Removed Values Added
References () https://metacpan.org/release/DBOOK/WWW-OAuth-1.000/source/lib/WWW/OAuth.pm#L86 - () https://metacpan.org/release/DBOOK/WWW-OAuth-1.000/source/lib/WWW/OAuth.pm#L86 - Issue Tracking, Product
References () https://perldoc.perl.org/functions/rand - () https://perldoc.perl.org/functions/rand - Third Party Advisory
References () https://security.metacpan.org/docs/guides/random-data-for-security.html - () https://security.metacpan.org/docs/guides/random-data-for-security.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2026/02/13/1 - () http://www.openwall.com/lists/oss-security/2026/02/13/1 - Mailing List, Third Party Advisory
Summary
  • (es) WWW::OAuth 1.000 y versiones anteriores para Perl utiliza la función rand() como fuente predeterminada de entropía, que no es criptográficamente segura, para funciones criptográficas.
CPE cpe:2.3:a:dbook:www\:\:oauth:*:*:*:*:*:perl:*:*
First Time Dbook www\
Dbook

17 Feb 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

13 Feb 2026, 20:17

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/02/13/1 -

13 Feb 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 00:16

Updated : 2026-03-10 17:07


NVD link : CVE-2025-40905

Mitre link : CVE-2025-40905

CVE.ORG link : CVE-2025-40905


JSON object : View

Products Affected

dbook

  • www\
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)