← Back to CVEs
CVE-2026-5088
HIGH7.5
Description
Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/15/2026
Last Modified4/17/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-338
References
https://metacpan.org/pod/Crypt::URandom(9b29abf9-4ab0-4765-b253-1875cd9b441e)
https://metacpan.org/release/JDEGUEST/Apache2-API-v0.5.2/view/lib/Apache2/API/Password.pod(9b29abf9-4ab0-4765-b253-1875cd9b441e)
https://metacpan.org/release/JDEGUEST/Apache2-API-v0.5.3/changes(9b29abf9-4ab0-4765-b253-1875cd9b441e)
https://security.metacpan.org/docs/guides/random-data-for-security.html(9b29abf9-4ab0-4765-b253-1875cd9b441e)
http://www.openwall.com/lists/oss-security/2026/04/15/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2026/04/15/5(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.