CVE-2025-15578
CRITICAL
2026-02-16
9b29abf9-4ab0-4765-b253-1875cd9b441e
9.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Feb 16, 2026 - 22:22 nvd
CRITICAL 9.8
Description
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
Analysis
Perl Maypole 2.10-2.13 generates session IDs insecurely using a weak PRNG, enabling session prediction and hijacking.
Technical Context
Maypole 2.10-2.13 uses CWE-338 weak PRNG for session ID generation, making tokens predictable.
Affected Products
['Perl Maypole 2.10-2.13']
Remediation
Update Maypole or use a secure session management library.
Priority Score
49
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).