WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

Project Subscriptions

Vendors Products
Www::oauth Subscribe
Advisories

No advisories yet.

Fixes

Solution

Upgrade to WWW::OAuth 1.001 or higher


Workaround

No workaround given by the vendor.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Dbook
Dbook www::oauth
Vendors & Products Dbook
Dbook www::oauth

Fri, 13 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Title WWW::OAuth 1.000 and earlier for Perl uses insecure rand() function for cryptographic functions
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-02-17T15:05:12.318Z

Reserved: 2025-04-16T09:05:34.360Z

Link: CVE-2025-40905

cve-icon Vulnrichment

Updated: 2026-02-13T19:16:45.884Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-13T00:16:03.280

Modified: 2026-02-17T15:16:18.387

Link: CVE-2025-40905

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:28:54Z

Weaknesses