Solstice

1 CVEs product

Monthly

CVE-2026-5085 CRITICAL Act Now

Weak session ID generation in Solstice::Session for Perl (all versions through 1440) enables session prediction and hijacking attacks by unauthenticated remote attackers. The vulnerability stems from cryptographically weak entropy sources (MD5 with predictable epoch time, stringified hash references, 16-bit rand() seeding, and limited process IDs), allowing attackers to forge valid session tokens and impersonate legitimate users. EPSS score of 0.02% (4th percentile) indicates low observed exploitation likelihood, and no public exploit code or CISA KEV listing exists at time of analysis, though the weakness class (CWE-340) is well-understood and exploitable given sufficient reconnaissance.

Information Disclosure Solstice
NVD VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-5085
EPSS 0% CVSS 9.1
CRITICAL Act Now

Weak session ID generation in Solstice::Session for Perl (all versions through 1440) enables session prediction and hijacking attacks by unauthenticated remote attackers. The vulnerability stems from cryptographically weak entropy sources (MD5 with predictable epoch time, stringified hash references, 16-bit rand() seeding, and limited process IDs), allowing attackers to forge valid session tokens and impersonate legitimate users. EPSS score of 0.02% (4th percentile) indicates low observed exploitation likelihood, and no public exploit code or CISA KEV listing exists at time of analysis, though the weakness class (CWE-340) is well-understood and exploitable given sufficient reconnaissance.

Information Disclosure Solstice
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy