PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely. PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications. This modules does not use the Crypt::URandom module, and installing it will not fix the problem. The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie. A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Jjnapiork
Jjnapiork pagi::middleware::session::store::cookie
Vendors & Products Jjnapiork
Jjnapiork pagi::middleware::session::store::cookie
References

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely. PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of random bytes generated by the built-in rand function, which is unsuitable for cryptographic applications. This modules does not use the Crypt::URandom module, and installing it will not fix the problem. The random bytes are used for generating an initialisation vector (IV) to encrypt the cookie. A predictable IV may make it easier for malicious users to decrypt and tamper with the session data that is stored in the cookie.
Title PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely
Weaknesses CWE-1204
CWE-338
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2026-03-31T16:03:08.278Z

Updated: 2026-04-01T14:43:35.295Z

Reserved: 2026-03-28T19:29:58.433Z

Link: CVE-2026-5087

cve-icon Vulnrichment

Updated: 2026-03-31T18:18:48.427Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T16:16:35.080

Modified: 2026-04-01T16:23:52.180

Link: CVE-2026-5087

cve-icon Redhat

No data.