CVE-2026-5085
CRITICALSolstice::Session versions through 1440 for Perl generates session ids insecurely
Title source: cnaDescription
Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it is not leaked in the HTTP Date header. Stringified hash refences will contain predictable content. The built-in rand() function is seeded by 16-bits and is unsuitable for security purposes. The process id comes from a small set of numbers. Predictable session ids could allow an attacker to gain access to systems.
References (4)
Scores
CVSS v3
9.1
EPSS
0.0004
EPSS Percentile
12.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-338
CWE-340
Status
published
Products (1)
MCRAWFOR/Solstice::Session
< 1440
Published
Apr 13, 2026
Tracked Since
Apr 13, 2026