CVE-2014-125112
March 26, 2026
Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution.
Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.
Affected Packages
https://github.com/plack/Plack-Middleware-Session.git (GITHUB):
Affected version(s) >=0.09_01 <0.23Fix Suggestion:
Update to version 0.23https://github.com/plack/Plack-Middleware-Session.git (GITHUB):
Affected version(s) >=0.09_01 <0.23Fix Suggestion:
Update to version 0.23https://github.com/plack/Plack-Middleware-Session.git (GITHUB):
Affected version(s) >=0.09_01 <0.23Fix Suggestion:
Update to version 0.23Related ResourcesĀ (3)
Do you need more information?
Contact UsCVSS v3
Base Score:
9.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Reliance on Cookies without Validation and Integrity Checking
EPSS
Base Score:
0.09