Description

HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend. For example, if an application uses memcached for session storage, then it may be possible for a remote attacker to inject memcached commands in the session id value.

INFO

Published Date :

2026-02-27T20:15:31.418Z

Last Modified :

2026-03-03T20:22:20.829Z

Source :

CPANSec
AFFECTED PRODUCTS

The following products are affected by CVE-2018-25160 vulnerability.

Vendors Products
Tokuhirom
  • Http::session2
  • Http\

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact