CVE-2025-27551: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in WREIS DBIx::Class::EncodedColumn
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
AI Analysis
Technical Summary
CVE-2025-27551 identifies a cryptographic weakness in the WREIS DBIx::Class::EncodedColumn Perl module, specifically in versions up to 0.00032. The vulnerability arises from the use of the standard rand() function to generate salts for password hashing. The rand() function is a general-purpose pseudo-random number generator (PRNG) that is not designed to be cryptographically secure. Consequently, salts generated using rand() can be predictable or reproducible by attackers, undermining the effectiveness of password hashing. This weakness is located in the program file lib/DBIx/Class/EncodedColumn/Digest.pm. Salts are critical in password hashing to ensure that identical passwords produce different hashes and to defend against precomputed hash attacks such as rainbow tables. Using a weak PRNG for salt generation compromises this defense, potentially allowing attackers to more easily reverse or guess password hashes. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG), CWE-916 (Use of Password-Based Cryptography), and CWE-331 (Insufficient Entropy). The CVSS v3.1 score is 4.0 (medium severity), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality loss, with no integrity or availability impact. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that remediation may require updating the module to a version that replaces rand() with a cryptographically secure random number generator (CSPRNG).
Potential Impact
For European organizations using the DBIx::Class::EncodedColumn module in their Perl-based applications, this vulnerability poses a risk to the confidentiality of user credentials. If an attacker gains local access to the system or can execute code within the application environment, they may predict or reproduce salts used in password hashes, facilitating offline password cracking attacks. This could lead to unauthorized access to user accounts and potentially escalate to further compromise depending on the application context. Although the vulnerability does not directly affect system integrity or availability, the exposure of credentials can have significant reputational and regulatory consequences, especially under GDPR requirements for protecting personal data. Organizations in sectors with high security demands, such as finance, healthcare, and government, may face increased risk if this module is part of their authentication infrastructure. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent exploitation.
Mitigation Recommendations
European organizations should audit their use of the DBIx::Class::EncodedColumn module to determine if affected versions (up to 0.00032) are in use. Immediate mitigation steps include: 1) Upgrading to a patched or newer version of the module that uses a cryptographically secure random number generator (such as those provided by Crypt::Random or similar Perl modules) for salt generation. 2) If no patch is available, modifying the source code to replace rand() calls with a CSPRNG-based function for salt creation. 3) Conducting a password reset campaign for users if there is suspicion of credential compromise. 4) Enhancing monitoring for unusual authentication attempts or local access that might indicate exploitation attempts. 5) Reviewing overall password hashing mechanisms to ensure use of strong algorithms (e.g., bcrypt, Argon2) combined with secure salts. 6) Implementing strict access controls to limit local access to systems running vulnerable software. These steps go beyond generic advice by focusing on the specific weakness in salt generation and emphasizing code-level remediation and operational controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-27551: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in WREIS DBIx::Class::EncodedColumn
Description
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.
AI-Powered Analysis
Technical Analysis
CVE-2025-27551 identifies a cryptographic weakness in the WREIS DBIx::Class::EncodedColumn Perl module, specifically in versions up to 0.00032. The vulnerability arises from the use of the standard rand() function to generate salts for password hashing. The rand() function is a general-purpose pseudo-random number generator (PRNG) that is not designed to be cryptographically secure. Consequently, salts generated using rand() can be predictable or reproducible by attackers, undermining the effectiveness of password hashing. This weakness is located in the program file lib/DBIx/Class/EncodedColumn/Digest.pm. Salts are critical in password hashing to ensure that identical passwords produce different hashes and to defend against precomputed hash attacks such as rainbow tables. Using a weak PRNG for salt generation compromises this defense, potentially allowing attackers to more easily reverse or guess password hashes. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG), CWE-916 (Use of Password-Based Cryptography), and CWE-331 (Insufficient Entropy). The CVSS v3.1 score is 4.0 (medium severity), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality loss, with no integrity or availability impact. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that remediation may require updating the module to a version that replaces rand() with a cryptographically secure random number generator (CSPRNG).
Potential Impact
For European organizations using the DBIx::Class::EncodedColumn module in their Perl-based applications, this vulnerability poses a risk to the confidentiality of user credentials. If an attacker gains local access to the system or can execute code within the application environment, they may predict or reproduce salts used in password hashes, facilitating offline password cracking attacks. This could lead to unauthorized access to user accounts and potentially escalate to further compromise depending on the application context. Although the vulnerability does not directly affect system integrity or availability, the exposure of credentials can have significant reputational and regulatory consequences, especially under GDPR requirements for protecting personal data. Organizations in sectors with high security demands, such as finance, healthcare, and government, may face increased risk if this module is part of their authentication infrastructure. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent exploitation.
Mitigation Recommendations
European organizations should audit their use of the DBIx::Class::EncodedColumn module to determine if affected versions (up to 0.00032) are in use. Immediate mitigation steps include: 1) Upgrading to a patched or newer version of the module that uses a cryptographically secure random number generator (such as those provided by Crypt::Random or similar Perl modules) for salt generation. 2) If no patch is available, modifying the source code to replace rand() calls with a CSPRNG-based function for salt creation. 3) Conducting a password reset campaign for users if there is suspicion of credential compromise. 4) Enhancing monitoring for unusual authentication attempts or local access that might indicate exploitation attempts. 5) Reviewing overall password hashing mechanisms to ensure use of strong algorithms (e.g., bcrypt, Argon2) combined with secure salts. 6) Implementing strict access controls to limit local access to systems running vulnerable software. These steps go beyond generic advice by focusing on the specific weakness in salt generation and emphasizing code-level remediation and operational controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CPANSec
- Date Reserved
- 2025-02-28T20:33:23.575Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bae6eb9bc4cbad54150dbe
Added to database: 9/5/2025, 1:34:35 PM
Last enriched: 9/5/2025, 1:35:42 PM
Last updated: 10/21/2025, 11:49:29 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61756: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. in Oracle Corporation Oracle Financial Services Analytical Applications Infrastructure
HighCVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox
HighCVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox
MediumCVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox
MediumCVE-2025-62590: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.