oss-sec mailing list archives
CVE-2026-45180: Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids
From: Robert Rothenberg <rrwo () cpansec org>
Date: Sun, 10 May 2026 21:07:36 +0100
======================================================================== CVE-2026-45180 CPAN Security Group ======================================================================== CVE ID: CVE-2026-45180 Distribution: Catalyst-Plugin-Statsd Versions: through 0.10.0 MetaCPAN: https://metacpan.org/dist/Catalyst-Plugin-Statsd VCS Repo: https://github.com/robrwo/CatalystX-Statsd Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids Description ----------- Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens. Problem types ------------- - CWE-319 Cleartext Transmission of Sensitive Information Workarounds ----------- Use a statsd daemon on the same host or through a secure communications channel. Solutions --------- Upgrade to version 0.10.0 of later, which will no longer log session ids to statsd. If Plack::Middleware::Statsd is upgraded to 0.9.0 or later and is configured to log some information securely, then session ids will be logged as HMAC signatures instead. References ---------- https://github.com/robrwo/CatalystX-Statsd/security/advisories/GHSA-gjvr-hq83-fc38 https://metacpan.org/release/RRWO/Catalyst-Plugin-Statsd-v0.10.0/changes https://www.cve.org/CVERecord?id=CVE-2026-45179 https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-9gwm-665p-w2xx
Current thread:
- CVE-2026-45180: Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids Robert Rothenberg (May 10)
