PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely.
PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications.
This modules does not use the Crypt::URandom module, and installing it will not fix the problem.
The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie.
A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.
References
| Link | Resource |
|---|---|
| https://metacpan.org/release/JJNAPIORK/PAGI-Middleware-Session-Store-Cookie-0.001003/source/lib/PAGI/Middleware/Session/Store/Cookie.pm#L156-173 | Broken Link |
| https://metacpan.org/release/JJNAPIORK/PAGI-Middleware-Session-Store-Cookie-0.001004/changes | Release Notes |
| http://www.openwall.com/lists/oss-security/2026/03/31/10 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Apr 2026, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jjnapiork:pagi\:\:middleware\:\:session\:\:store\:\:cookie:*:*:*:*:*:perl:*:* | |
| First Time |
Jjnapiork
Jjnapiork pagi\ |
|
| References | () https://metacpan.org/release/JJNAPIORK/PAGI-Middleware-Session-Store-Cookie-0.001003/source/lib/PAGI/Middleware/Session/Store/Cookie.pm#L156-173 - Broken Link | |
| References | () https://metacpan.org/release/JJNAPIORK/PAGI-Middleware-Session-Store-Cookie-0.001004/changes - Release Notes | |
| References | () http://www.openwall.com/lists/oss-security/2026/03/31/10 - Mailing List, Third Party Advisory |
01 Apr 2026, 16:23
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
31 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
31 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 16:16
Updated : 2026-04-03 19:18
NVD link : CVE-2026-5087
Mitre link : CVE-2026-5087
CVE.ORG link : CVE-2026-5087
JSON object : View
Products Affected
jjnapiork
- pagi\
