Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids.

If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.

Project Subscriptions

Vendors Products
Catalyst::plugin::statsd Subscribe
Advisories

No advisories yet.

Fixes

Solution

Upgrade to version 0.10.0 of later, which will no longer log session ids to statsd. If Plack::Middleware::Statsd is upgraded to 0.9.0 or later and is configured to log some information securely, then session ids will be logged as HMAC signatures instead.


Workaround

Use a statsd daemon on the same host or through a secure communications channel.

History

Mon, 11 May 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Rrwo
Rrwo catalyst::plugin::statsd
Vendors & Products Rrwo
Rrwo catalyst::plugin::statsd

Sun, 10 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' session ids may be leaked. This may allow an attacker to use session ids as authentication tokens.
Title Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids
Weaknesses CWE-319
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-10T20:03:18.315Z

Reserved: 2026-05-09T18:57:17.867Z

Link: CVE-2026-45180

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T21:16:29.170

Modified: 2026-05-10T21:16:29.170

Link: CVE-2026-45180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T16:10:57Z

Weaknesses