Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID. | |
| Title | Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely | |
| Weaknesses | CWE-338 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-02-16T21:18:16.085Z
Reserved: 2026-02-12T23:45:23.424Z
Link: CVE-2025-15578
No data.
Status : Received
Published: 2026-02-16T22:22:40.557
Modified: 2026-02-16T22:22:40.557
Link: CVE-2025-15578
No data.
OpenCVE Enrichment
No data.