Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 0.10026 or later.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password. | |
| Title | Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-21T21:07:26.432Z
Reserved: 2026-03-28T19:36:44.345Z
Link: CVE-2026-5091
No data.
Status : Received
Published: 2026-05-21T22:16:48.530
Modified: 2026-05-21T22:16:48.530
Link: CVE-2026-5091
No data.
OpenCVE Enrichment
No data.
Weaknesses