CVE-2025-40931

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id. Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chorny:apache\:\:session\:\:generate\:\:md5:*:*:*:*:*:perl:*:*

History

09 Mar 2026, 14:41

Type Values Removed Values Added
First Time Chorny apache\
Chorny
References () https://github.com/chorny/Apache-Session/issues/4 - () https://github.com/chorny/Apache-Session/issues/4 - Issue Tracking
References () https://metacpan.org/dist/Apache-Session/source/lib/Apache/Session/Generate/MD5.pm#L27 - () https://metacpan.org/dist/Apache-Session/source/lib/Apache/Session/Generate/MD5.pm#L27 - Product
References () https://rt.cpan.org/Ticket/Display.html?id=173631 - () https://rt.cpan.org/Ticket/Display.html?id=173631 - Third Party Advisory
References () https://security.metacpan.org/docs/guides/random-data-for-security.html - () https://security.metacpan.org/docs/guides/random-data-for-security.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2026/03/05/3 - () http://www.openwall.com/lists/oss-security/2026/03/05/3 - Mailing List, Third Party Advisory
CPE cpe:2.3:a:chorny:apache\:\:session\:\:generate\:\:md5:*:*:*:*:*:perl:*:*

06 Mar 2026, 04:15

Type Values Removed Values Added
References
  • () https://github.com/chorny/Apache-Session/issues/4 -
  • () https://rt.cpan.org/Ticket/Display.html?id=173631 -

05 Mar 2026, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

05 Mar 2026, 12:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/05/3 -

05 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 02:16

Updated : 2026-03-09 14:41


NVD link : CVE-2025-40931

Mitre link : CVE-2025-40931

CVE.ORG link : CVE-2025-40931


JSON object : View

Products Affected

chorny

  • apache\
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

CWE-340

Generation of Predictable Numbers or Identifiers