CVE-2026-5088
mediumEPSS Score
0.0%
Exploitation probability in 30 days
Top 93% most likely to be exploited
Vulnerability Report
Generated by CyberWatcher
Description
Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts.
The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function.
The rand function is unsuitable for cryptographic use.
These salts are used for password hashing.
CWE
CWE-338Affected Products
JDEGUEST Apache::API::Password