These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password.
Project Subscriptions
No advisories yet.
Solution
Upgrade to version 0.10026 or later.
Workaround
No workaround given by the vendor.
Fri, 22 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 22 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jjnapiork
Jjnapiork catalyst::plugin::authentication |
|
| Vendors & Products |
Jjnapiork
Jjnapiork catalyst::plugin::authentication |
Fri, 22 May 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash or password. | |
| Title | Catalyst::Plugin::Authentication versions through 0.10024 for Perl is susceptible to timing attacks | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-22T14:13:48.996Z
Reserved: 2026-03-28T19:36:44.345Z
Link: CVE-2026-5091
Updated: 2026-05-22T01:40:38.985Z
Status : Received
Published: 2026-05-21T22:16:48.530
Modified: 2026-05-22T02:16:34.970
Link: CVE-2026-5091
No data.
OpenCVE Enrichment
Updated: 2026-05-22T17:30:06Z