CVE-2024-58135

MEDIUM

Mojolicious <7.28 - Info Disclosure

Title source: llm
STIX 2.1

Description

Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via "mojo generate app" by default When creating a default app skeleton with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.

Scores

CVSS v3 5.3
EPSS 0.0063
EPSS Percentile 70.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-338
Status published
Products (1)
mojolicious/mojolicious 7.28 - 9.40
Published May 03, 2025
Tracked Since Feb 18, 2026