Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3255: CWE-340 Generation of Predictable Numbers or Identifiers in TOKUHIROM HTTP::Session2

0
Medium
VulnerabilityCVE-2026-3255cvecve-2026-3255cwe-340cwe-338
Published: Fri Feb 27 2026 (02/27/2026, 20:12:35 UTC)
Source: CVE Database V5
Vendor/Project: TOKUHIROM
Product: HTTP::Session2

Description

HTTP::Session2 versions before 1.12 for Perl for Perl may generate weak session ids using the rand() function. The HTTP::Session2 session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand() function is unsuitable for cryptographic usage. HTTP::Session2 after version 1.02 will attempt to use the /dev/urandom device to generate a session id, but if the device is unavailable (for example, under Windows), then it will revert to the insecure method described above.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:20:52 UTC

Technical Analysis

CVE-2026-3255 identifies a cryptographic weakness in the HTTP::Session2 Perl module used for managing web session identifiers. The vulnerability arises from the use of the built-in rand() function, which is not cryptographically secure, to seed the SHA-1 hash that generates session IDs. The seed includes the output of rand(), the epoch time, and the process ID (PID). Because the PID is drawn from a limited set of values and the epoch time can be guessed or inferred (for example, from the HTTP Date header), the resulting session IDs are predictable. This predictability allows attackers to potentially guess valid session IDs, leading to session hijacking or impersonation attacks. Starting from version 1.02, HTTP::Session2 attempts to use the system's /dev/urandom device to generate randomness, which is cryptographically secure. However, if /dev/urandom is unavailable, such as on Windows platforms, the module falls back to the insecure method, reintroducing the vulnerability. The flaw affects all versions prior to 1.12, and no patches or fixes are explicitly linked, but upgrading to versions that avoid fallback or use secure random sources is implied. The vulnerability is classified under CWE-340 (Generation of Predictable Numbers or Identifiers) and CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator). The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality and availability impact.

Potential Impact

This vulnerability can have significant impacts on organizations that use HTTP::Session2 for session management in web applications. Predictable session IDs allow attackers to hijack user sessions without authentication, potentially gaining unauthorized access to sensitive information or user accounts. This compromises confidentiality and can disrupt availability if attackers manipulate sessions or cause denial of service by invalidating sessions. The ease of exploitation is moderate since attackers need to guess or infer epoch time and PID, but no authentication or user interaction is required, increasing risk. Organizations relying on vulnerable versions, especially on Windows systems where fallback to insecure randomness occurs, face higher exposure. The impact is particularly critical for applications handling sensitive data, financial transactions, or personal information. While no known exploits are reported, the vulnerability presents a clear attack vector for session hijacking and impersonation, undermining trust and security of web services.

Mitigation Recommendations

Organizations should upgrade HTTP::Session2 to version 1.12 or later, ensuring that the module uses cryptographically secure random number generators without fallback to insecure methods. For environments where /dev/urandom is unavailable (e.g., Windows), verify that the module does not revert to the weak rand() based method or consider patching the module to enforce secure randomness sources. Additionally, implement defense-in-depth by enforcing short session lifetimes, binding sessions to client IP addresses or user agents where feasible, and monitoring for anomalous session activity. Web applications should also consider integrating alternative session management libraries that guarantee cryptographically secure session ID generation. Regularly audit and test session management mechanisms for randomness quality and resistance to prediction attacks. Finally, ensure HTTP headers do not leak epoch time or other predictable values that could aid attackers in guessing session IDs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-02-26T11:43:17.278Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a1fde732ffcdb8a26e4130

Added to database: 2/27/2026, 8:26:15 PM

Last enriched: 3/6/2026, 9:20:52 PM

Last updated: 4/13/2026, 9:25:36 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses