PT-2026-33009 · Jdeguest · Apache::Api::Password

Published

2026-04-15

·

Updated

2026-04-15

·

CVE-2026-5088

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts.
The make salt and make salt bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function.
The rand function is unsuitable for cryptographic use.
These salts are used for password hashing.

Weakness Enumeration

Related Identifiers

CVE-2026-5088

Affected Products

Apache::Api::Password