LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-40926

CVE-2025-40926 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 5, 2026

Plack::Middleware::Session::Simple - Authentication Bypass

Published: March 5, 2026Updated: March 5, 2026Remote Exploitable

Overview

Plack::Middleware::Session::Simple <= 0.04 for Perl contains a broken authentication caused by insecure session ID generation using predictable seeds, letting attackers guess session IDs and gain unauthorized access, exploit requires no special privileges.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 4.6%(Probability of exploitation in next 30 days)

Impact

Attackers can predict session IDs to hijack sessions and gain unauthorized access to user accounts or systems.

Mitigation

Update to the latest version with secure session ID generation.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 5, 2026

šŸ”“ CVE-2025-40926 - Critical (9.8) Plack::Middleware::Session::Simple versions through 0.04 for Perl generates session ids insecurely. The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-40926/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-40926
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
unconfirmed
EPSS
4.6%
Social Posts
1

CWE

  • CWE-338

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

4.6%Probability of exploitation in the next 30 days