Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses.
If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked.
Since version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead.
If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked.
Since version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 0.9.0 or later.
Workaround
Use a statsd daemon on the same host or through a secure communications channel.
References
History
Sun, 10 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked. Since version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead. | |
| Title | Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses | |
| Weaknesses | CWE-319 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-10T21:17:03.221Z
Reserved: 2026-05-09T18:57:17.867Z
Link: CVE-2026-45179
No data.
Status : Received
Published: 2026-05-10T20:16:28.967
Modified: 2026-05-10T20:16:28.967
Link: CVE-2026-45179
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:30:19Z
Weaknesses