Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts.

The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function.

The rand function is unsuitable for cryptographic use.

These salts are used for password hashing.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to version v0.5.3 or later, and install Crypt::URandom.


Workaround

Install Crypt::URandom.

History

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 18:30:00 +0000


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Jdeguest
Jdeguest apache::api::password
Vendors & Products Jdeguest
Jdeguest apache::api::password

Wed, 15 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing.
Title Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-04-16T12:05:32.095Z

Reserved: 2026-03-28T19:31:47.729Z

Link: CVE-2026-5088

cve-icon Vulnrichment

Updated: 2026-04-15T17:24:20.860Z

cve-icon NVD

Status : Received

Published: 2026-04-15T08:16:16.790

Modified: 2026-04-16T13:16:50.840

Link: CVE-2026-5088

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:00:10Z

Weaknesses