TROYANOSYVIRUS
Back to CVEs

CVE-2024-58134

HIGH
8.1

Description

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies.  An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

CVE Details

CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published5/3/2025
Last Modified10/20/2025
Sourcenvd
Honeypot Sightings0

Affected Products

mojolicious:mojolicious

Weaknesses (CWE)

CWE-321CWE-331

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.