CVE-2026-5088

medium Apache
EPSS Score
0.0%
Exploitation probability in 30 days
Top 93% most likely to be exploited
Published: April 15, 2026 (29 days ago)
Last Modified: April 16, 2026
Vendor: Apache
Source: MITRE

Description

Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing.

CWE

CWE-338

Affected Products

JDEGUEST Apache::API::Password

References