The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function.
The rand function is unsuitable for cryptographic use.
These salts are used for password hashing.
Project Subscriptions
No advisories yet.
Solution
Upgrade to version v0.5.3 or later, and install Crypt::URandom.
Workaround
Install Crypt::URandom.
Wed, 06 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jdeguest apache\
|
|
| CPEs | cpe:2.3:a:jdeguest:apache\:\:api\:\:password:*:*:*:*:*:perl:*:* | |
| Vendors & Products |
Jdeguest apache\
|
Fri, 01 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing. | Apache::API::Password versions through 0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing. |
| Title | Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts | Apache::API::Password versions through 0.5.2 for Perl can generate insecure random values for salts |
Thu, 16 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 15 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jdeguest
Jdeguest apache::api::password |
|
| Vendors & Products |
Jdeguest
Jdeguest apache::api::password |
Wed, 15 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing. | |
| Title | Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts | |
| Weaknesses | CWE-338 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-01T16:03:43.825Z
Reserved: 2026-03-28T19:31:47.729Z
Link: CVE-2026-5088
Updated: 2026-04-15T17:24:20.860Z
Status : Analyzed
Published: 2026-04-15T08:16:16.790
Modified: 2026-05-06T14:18:23.253
Link: CVE-2026-5088
No data.
OpenCVE Enrichment
Updated: 2026-05-02T08:30:26Z