PT-2026-8387 · Unknown · Concierge::Sessions
Robert Rothenberg
·
Published
2026-02-16
·
Updated
2026-02-17
·
CVE-2026-2439
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Concierge::Sessions versions 0.8.1 through 0.8.4
Description
The
generate session id function within Concierge::Sessions::Base defaults to insecure methods for generating session identifiers. Specifically, it uses the uuidgen command, which may fall back to Perl's rand() function if uuidgen fails, or generate time-based UUIDs if a high-quality random number source is unavailable. Both rand() and time-based UUIDs are predictable and unsuitable for security applications. The possession of these identifiers grants access, as per RFC 9562. There is no warning when uuidgen fails, potentially leading to the silent use of the insecure rand() function.Recommendations
Upgrade to version 0.8.5 or later.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Concierge::Sessions