Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids.
If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.
Metrics
Affected Vendors & Products
References
History
Sun, 10 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens. | |
| Title | Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids | |
| Weaknesses | CWE-319 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-10T20:03:18.315Z
Reserved: 2026-05-09T18:57:17.867Z
Link: CVE-2026-45180
No data.
Status : Received
Published: 2026-05-10T21:16:29.170
Modified: 2026-05-10T21:16:29.170
Link: CVE-2026-45180
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:30:20Z