Ghostwire

CVE-2026-5088: Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and...

HIGH CVSS 7.5 EPSS 0.02%

Published: April 15, 2026 | Last Modified: April 15, 2026

Description

Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts. The _make_salt and _make_salt_bcrypt methods will attept to load Crypt::URandom and then Bytes::Random::Secure to generate random bytes for the salt. If those modules are unavailable, it will simply return 16 bytes generated with Perl's built-in rand function. The rand function is unsuitable for cryptographic use. These salts are used for password hashing.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.02% (4th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (1 articles)

References