Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CWE-338)
2025-06-16
9b29abf9-4ab0-4765-b253-1875cd9b441e
9.1
CVSS 3.1
Share
CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Lifecycle Timeline
3
Analysis Generated
Mar 14, 2026 - 21:59 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:59 euvd
EUVD-2025-18387
CVE Published
Jun 16, 2025 - 11:15 nvd
CRITICAL 9.1
DescriptionNVD
Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha.
That version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure.
AnalysisAI
A remote code execution vulnerability (CVSS 9.1). Critical severity with potential for significant impact on affected systems.
Technical ContextAI
Vulnerability type: remote code execution. CVSS 9.1 indicates critical severity with likely remote exploitation vector.
RemediationAI
Monitor vendor channels for patch availability.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-18387