CVE-2025-15578

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:teejay:maypole:*:*:*:*:*:perl:*:*
cpe:2.3:a:teejay:maypole:2.111:*:*:*:*:perl:*:*
cpe:2.3:a:teejay:maypole:2.121:*:*:*:*:perl:*:*

History

No history.

Information

Published : 2026-02-16 22:22

Updated : 2026-03-10 15:07


NVD link : CVE-2025-15578

Mitre link : CVE-2025-15578

CVE.ORG link : CVE-2025-15578


JSON object : View

Products Affected

teejay

  • maypole
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)