Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3381: CWE-1395 Dependency on Vulnerable Third-Party Component in PMQS Compress::Raw::Zlib

0
High
VulnerabilityCVE-2026-3381cvecve-2026-3381cwe-1395
Published: Thu Mar 05 2026 (03/05/2026, 01:28:48 UTC)
Source: CVE Database V5
Vendor/Project: PMQS
Product: Compress::Raw::Zlib

Description

CVE-2026-3381 is a vulnerability in the Perl module Compress::Raw::Zlib, which uses an outdated and potentially insecure version of the zlib compression library. Versions through 2. 219 include a copy of zlib that contains known security issues, which were addressed in zlib 1. 3. 2 included starting with Compress::Raw::Zlib version 2. 220. The vulnerability is classified under CWE-1395, indicating dependency on a vulnerable third-party component. Although no known exploits are currently reported in the wild, the presence of insecure zlib versions can lead to risks such as memory corruption or denial of service. This vulnerability affects any Perl applications relying on Compress::Raw::Zlib versions prior to 2. 220.

AI-Powered Analysis

AILast updated: 03/05/2026, 02:33:36 UTC

Technical Analysis

CVE-2026-3381 identifies a security vulnerability in the Perl module Compress::Raw::Zlib, which bundles an outdated version of the zlib compression library. Specifically, versions of Compress::Raw::Zlib up to 2.219 include a copy of zlib that contains security weaknesses identified in prior audits, such as the 7ASecurity audit. These weaknesses were addressed in zlib version 1.3.2, which is included starting from Compress::Raw::Zlib version 2.220. The vulnerability is categorized under CWE-1395, indicating a dependency on a vulnerable third-party component. Because Compress::Raw::Zlib statically includes zlib, applications using vulnerable versions inherit the risks associated with the older zlib codebase. Potential issues include memory corruption, buffer overflows, or denial of service conditions triggered by crafted compressed data. Although no active exploits have been reported, the vulnerability poses a latent risk to any Perl-based software relying on this module for compression tasks. The fix involves upgrading to Compress::Raw::Zlib 2.220 or later, which integrates the secure zlib 1.3.2. This vulnerability highlights the importance of managing third-party dependencies and promptly applying updates to embedded libraries.

Potential Impact

The impact of CVE-2026-3381 is significant for organizations using Perl applications that depend on Compress::Raw::Zlib versions prior to 2.220. Exploitation could lead to memory corruption or denial of service, potentially causing application crashes or enabling further exploitation depending on the context of use. This can disrupt business operations, degrade service availability, and in some cases, compromise data integrity or confidentiality if exploited in complex attack chains. Since zlib is a widely used compression library, the embedded vulnerable version in Compress::Raw::Zlib affects a broad range of Perl applications, including those in enterprise software, web services, and embedded systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability. Organizations that fail to update may face increased risk of service disruption and potential data breaches.

Mitigation Recommendations

To mitigate CVE-2026-3381, organizations should immediately upgrade Compress::Raw::Zlib to version 2.220 or later, which includes the secure zlib 1.3.2 library. Review all Perl applications and dependencies to identify usage of vulnerable Compress::Raw::Zlib versions. Implement automated dependency management and vulnerability scanning tools to detect outdated third-party components. Where upgrading is not immediately feasible, consider isolating or sandboxing affected applications to limit potential impact. Monitor security advisories for any emerging exploits related to this vulnerability. Additionally, conduct code audits and penetration testing focused on compression and decompression functionalities to detect potential exploitation attempts. Educate development teams on the risks of embedded vulnerable libraries and enforce policies for timely patching of third-party dependencies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-02-28T09:24:49.085Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a8e7f5d1a09e29cba26c42

Added to database: 3/5/2026, 2:18:29 AM

Last enriched: 3/5/2026, 2:33:36 AM

Last updated: 3/5/2026, 3:19:58 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses