Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2588: CWE-190 Integer Overflow or Wraparound in TIMLEGGE Crypt::NaCl::Sodium

0
Critical
VulnerabilityCVE-2026-2588cvecve-2026-2588cwe-190
Published: Sun Feb 22 2026 (02/22/2026, 23:31:19 UTC)
Source: CVE Database V5
Vendor/Project: TIMLEGGE
Product: Crypt::NaCl::Sodium

Description

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:32:16 UTC

Technical Analysis

CVE-2026-2588 is an integer overflow vulnerability classified under CWE-190 found in the Crypt::NaCl::Sodium Perl module up to version 2.001. The issue specifically affects 32-bit systems where the size_t type (typically 32 bits) is cast to an unsigned long long (at least 64 bits) in the Sodium.xs source file. This casting occurs when passing a length pointer to libsodium cryptographic functions. Because size_t is smaller on 32-bit architectures, this improper casting can lead to integer overflow or wraparound, causing the length value to be misinterpreted. This can result in buffer overflows or memory corruption during cryptographic operations, potentially compromising the integrity and availability of the cryptographic processes. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no exploits have been reported in the wild, the high CVSS score (9.1) reflects the critical nature of the flaw. The root cause lies in a type mismatch and insufficient validation of length parameters passed to underlying libsodium functions, which are widely used for secure cryptographic primitives. This vulnerability highlights the risks of improper type handling in cross-language bindings and the importance of architecture-specific considerations in security-critical code.

Potential Impact

The integer overflow can lead to memory corruption, which may allow attackers to manipulate cryptographic operations, potentially causing denial of service or integrity violations. Since the vulnerability affects cryptographic primitives, it could undermine the security guarantees of applications relying on Crypt::NaCl::Sodium for encryption, authentication, or key management. The flaw is exploitable remotely without authentication or user interaction, increasing the risk of widespread attacks. Organizations using this module on 32-bit systems—common in embedded devices, legacy systems, or specialized environments—face risks of compromised data integrity and service availability. The impact extends to any software or service that depends on this Perl module for cryptographic functions, potentially affecting secure communications, data protection, and authentication mechanisms. Given the critical CVSS score, the vulnerability demands urgent attention to prevent exploitation that could disrupt operations or lead to data manipulation.

Mitigation Recommendations

1. Immediately audit all systems running Crypt::NaCl::Sodium on 32-bit architectures to identify vulnerable versions. 2. Apply patches or updates from the vendor as soon as they become available; if no official patch exists, consider backporting fixes that correctly handle size_t to unsigned long long casting. 3. Implement strict input validation and length checks in any custom code interfacing with libsodium to prevent overflow conditions. 4. Where feasible, migrate affected systems from 32-bit to 64-bit architectures to avoid the underlying type size mismatch. 5. Employ runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing to detect overflow issues early. 6. Monitor network traffic and logs for anomalous behavior that could indicate exploitation attempts targeting cryptographic functions. 7. Educate developers and security teams about the risks of improper type casting in cross-language bindings and the importance of architecture-aware coding practices. 8. Consider isolating or sandboxing applications using this module to limit potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-02-16T14:52:54.157Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699b9581be58cf853bc3df9e

Added to database: 2/22/2026, 11:47:13 PM

Last enriched: 3/2/2026, 6:32:16 AM

Last updated: 4/9/2026, 3:04:27 AM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses