WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to WWW::OAuth 1.001 or higher


Workaround

No workaround given by the vendor.

History

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Dbook www\
CPEs cpe:2.3:a:dbook:www\:\:oauth:*:*:*:*:*:perl:*:*
Vendors & Products Dbook www\

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Dbook
Dbook www::oauth
Vendors & Products Dbook
Dbook www::oauth

Fri, 13 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Title WWW::OAuth 1.000 and earlier for Perl uses insecure rand() function for cryptographic functions
Weaknesses CWE-338
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-02-17T15:05:12.318Z

Reserved: 2025-04-16T09:05:34.360Z

Link: CVE-2025-40905

cve-icon Vulnrichment

Updated: 2026-02-13T19:16:45.884Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T00:16:03.280

Modified: 2026-03-10T17:07:16.893

Link: CVE-2025-40905

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:28:54Z

Weaknesses