Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27552: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in WREIS DBIx::Class::EncodedColumn

0
Medium
VulnerabilityCVE-2025-27552cvecve-2025-27552cwe-338cwe-916cwe-331
Published: Wed Mar 26 2025 (03/26/2025, 11:08:11 UTC)
Source: CVE Database V5
Vendor/Project: WREIS
Product: DBIx::Class::EncodedColumn

Description

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.

AI-Powered Analysis

AILast updated: 09/05/2025, 13:35:29 UTC

Technical Analysis

CVE-2025-27552 is a medium-severity vulnerability affecting the WREIS project’s DBIx::Class::EncodedColumn module, specifically versions up to 0.00032. The vulnerability arises from the use of the standard rand() function to generate salts for password hashing. The rand() function is a pseudo-random number generator (PRNG) that is not cryptographically secure, meaning its output can be predicted or reproduced by attackers with sufficient knowledge or access. The affected code involves the Crypt/Eksblowfish/Bcrypt.pm file, which is responsible for implementing bcrypt password hashing. Since bcrypt relies on a salt to ensure that identical passwords produce different hashes, using a weak PRNG for salt generation undermines the security of the password hashes. An attacker could potentially predict or reproduce the salt values, facilitating offline brute-force or dictionary attacks against stored password hashes. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG), CWE-916 (Use of Password-Based Cryptography with Insufficient Iterations), and CWE-331 (Insufficient Entropy). The CVSS v3.1 base score is 4.0, indicating a medium severity, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack requires local access but no privileges or user interaction, and impacts confidentiality only. No known exploits are reported in the wild as of the publication date (March 26, 2025). This vulnerability primarily threatens the confidentiality of password data by weakening the salt randomness, potentially enabling attackers to recover user credentials more easily if they gain access to hashed password databases.

Potential Impact

For European organizations using DBIx::Class::EncodedColumn versions up to 0.00032, this vulnerability could lead to increased risk of credential compromise if attackers gain local access to systems or databases containing password hashes. Although exploitation requires local access, the weak salt generation reduces the effectiveness of password hashing, making offline attacks more feasible once hashes are obtained. This could lead to unauthorized access to sensitive systems, data breaches, and potential lateral movement within networks. Sectors with high-value or sensitive data, such as finance, healthcare, and government institutions, could face reputational damage, regulatory penalties under GDPR, and operational disruptions. The impact is mitigated by the requirement for local access and the absence of known remote exploits, but organizations relying on this module for authentication should consider the risk significant enough to warrant prompt remediation.

Mitigation Recommendations

Organizations should immediately audit their use of DBIx::Class::EncodedColumn and identify any deployments using versions up to 0.00032. They should upgrade to a patched version that replaces the insecure rand() function with a cryptographically secure PRNG, such as those provided by the Crypt::PRNG or similar secure modules. If an upgrade is not immediately possible, organizations should consider implementing additional layers of security, such as multi-factor authentication, to reduce the risk of credential compromise. Additionally, password hashes generated with weak salts should be rehashed with secure salts after patching. Access controls should be strengthened to limit local access to systems storing password hashes. Regular security audits and monitoring for unusual access patterns can help detect potential exploitation attempts. Finally, developers should review cryptographic implementations to ensure adherence to best practices for entropy and randomness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CPANSec
Date Reserved
2025-02-28T20:33:23.575Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bae6eb9bc4cbad54150dc2

Added to database: 9/5/2025, 1:34:35 PM

Last enriched: 9/5/2025, 1:35:29 PM

Last updated: 10/21/2025, 11:45:49 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-61756: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. in Oracle Corporation Oracle Financial Services Analytical Applications Infrastructure

High
VulnerabilityTue Oct 21 2025

CVE-2025-62641: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

CVE-2025-62592: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62591: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. in Oracle Corporation Oracle VM VirtualBox

Medium
VulnerabilityTue Oct 21 2025

CVE-2025-62590: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Oct 21 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats