{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:28:46.307","vulnerabilities":[{"cve":{"id":"CVE-2025-40932","sourceIdentifier":"9b29abf9-4ab0-4765-b253-1875cd9b441e","published":"2026-02-27T00:16:55.107","lastModified":"2026-03-03T19:36:24.010","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Apache::SessionX versions through 2.01 for Perl create insecure session id.\n\nApache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems."},{"lang":"es","value":"Las versiones de Apache::SessionX hasta la 2.01 para Perl crean un ID de sesión inseguro.\n\nApache::SessionX genera IDs de sesión de forma insegura. El generador de ID de sesión predeterminado en Apache::SessionX::Generate::MD5 devuelve un hash MD5 sembrado con la función rand() incorporada, el tiempo de época y el PID. El PID provendrá de un pequeño conjunto de números, y el tiempo de época puede ser adivinado, si no se filtra del encabezado HTTP Date. La función rand incorporada no es adecuada para uso criptográfico. Los IDs de sesión predecibles podrían permitir a un atacante obtener acceso a los sistemas."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"9b29abf9-4ab0-4765-b253-1875cd9b441e","type":"Secondary","description":[{"lang":"en","value":"CWE-338"},{"lang":"en","value":"CWE-340"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grichter:apache\\:\\:sessionx:*:*:*:*:*:perl:*:*","versionEndIncluding":"2.01","matchCriteriaId":"22753273-E170-4375-A53C-E0C5CEF00FAD"}]}]}],"references":[{"url":"https://metacpan.org/release/GRICHTER/Apache-SessionX-2.01/source/SessionX/Generate/MD5.pm#L29","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":["Issue Tracking"]}]}}]}