CVE-2025-40920
Linux Debian vulnerability analysis and mitigation

Overview

Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl contain a security vulnerability in their nonce generation mechanism. The vulnerability was discovered on August 11, 2025, and is tracked as CVE-2025-40920. The affected software generates nonces using the Perl Data::UUID library, which does not provide cryptographically secure random number generation (OSS_SECURITY).

Technical details

The vulnerability stems from the use of Data::UUID library for generating nonces in the authentication process. The technical issues are threefold: Data::UUID does not use a strong cryptographic source for generating UUIDs, it returns v3 UUIDs which are generated from known information and are unsuitable for security purposes as per RFC 9562, and the nonces should be generated from a strong cryptographic source as specified in RFC 7616. The vulnerability has been assigned a CVSS v3.1 Base Score of 8.6 HIGH with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L (NVD).

Impact

The use of predictable or cryptographically weak nonces in the authentication process could potentially allow attackers to compromise the security of the authentication mechanism. This could lead to unauthorized access, as the high CVSS score indicates potential for high confidentiality impact and low integrity and availability impacts (NVD).

Mitigation and workarounds

A patch has been developed that replaces the Data::UUID library with Crypt::SysRandom for nonce generation. The fix involves using Crypt::SysRandom::randombytes(20) to generate cryptographically secure nonces. Users should upgrade to versions that include this patch ([GITHUBPATCH](https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/commit/ad2c03aad95406db4ce35dfb670664ebde004c18.patch)).

Community reactions

The security community has responded promptly to the vulnerability, with NixOS package maintainers already working on applying the patch to their distributions. The fix has been merged into the main repository after security review (GITHUB_PR).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-49655CRITICAL9.8
  • PythonPython
  • keras
NoYesOct 17, 2025
CVE-2025-62672MEDIUM5.3
  • Linux DebianLinux Debian
  • rplay
NoNoOct 19, 2025
CVE-2025-40003N/AN/A
  • Linux DebianLinux Debian
  • linux
NoNoOct 18, 2025
CVE-2025-40002N/AN/A
  • Linux DebianLinux Debian
  • linux
NoNoOct 18, 2025
CVE-2025-40001N/AN/A
  • Linux DebianLinux Debian
  • linux
NoNoOct 18, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management