Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids.

If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.

Project Subscriptions

Vendors Products
Catalyst::plugin::statsd Subscribe
Advisories

No advisories yet.

Fixes

Solution

Upgrade to version 0.10.0 of later, which will no longer log session ids to statsd. If Plack::Middleware::Statsd is upgraded to 0.9.0 or later and is configured to log some information securely, then session ids will be logged as HMAC signatures instead.


Workaround

Use a statsd daemon on the same host or through a secure communications channel.

History

Tue, 12 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Rrwo
Rrwo catalyst::plugin::statsd
Vendors & Products Rrwo
Rrwo catalyst::plugin::statsd

Sun, 10 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.
Title Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids
Weaknesses CWE-319
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-12T14:26:17.506Z

Reserved: 2026-05-09T18:57:17.867Z

Link: CVE-2026-45180

cve-icon Vulnrichment

Updated: 2026-05-12T14:25:50.187Z

cve-icon NVD

Status : Deferred

Published: 2026-05-10T21:16:29.170

Modified: 2026-05-12T16:48:58.260

Link: CVE-2026-45180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T16:45:16Z

Weaknesses