CVE-2025-40924
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-40924 affects Catalyst::Plugin::Session before version 0.44 for Perl. The vulnerability was discovered and disclosed on July 17, 2025, and involves insecure session ID generation. The session ID is generated from a SHA-1 hash of low entropy components including a simple counter, epoch time, built-in rand function, process ID (PID), and the current Catalyst context (NVD).

Technical details

The vulnerability stems from using predictable components to generate session IDs. The session ID generation process combines several elements: a counter, epoch time (which may be leaked through HTTP Date headers), the built-in rand function (unsuitable for cryptographic usage), process ID (PID), and the Catalyst context. The CVSS v3.1 score is 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N (NVD).

Impact

The vulnerability could allow attackers to predict session IDs, potentially leading to unauthorized system access. The predictable nature of the session ID components significantly reduces the entropy of the generated IDs, making them susceptible to brute force or guessing attacks (NVD).

Mitigation and workarounds

The vulnerability has been fixed in version 0.44 of Catalyst::Plugin::Session by implementing Crypt::SysRandom to generate session IDs. The new implementation uses system entropy source to generate random bytes, providing a more secure method of session ID generation (GitHub Patch).

Community reactions

The security community has discussed the importance of using cryptographically secure random number generators for session ID generation. The patch was reviewed and merged after careful consideration of backward compatibility and security improvements (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22776HIGH8.7
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoJan 12, 2026
CVE-2026-22801MEDIUM6.8
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-accessibility-fastdebug
NoYesJan 12, 2026
CVE-2026-22695MEDIUM6.1
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-javadoc-zip
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-0665N/AN/A
  • Linux DebianLinux Debian
  • qemu
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management