CVE-2026-7381
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
29/04/2026
Última modificación:
07/05/2026
Descripción
*** Pendiente de traducción *** Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting.<br />
<br />
Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment.<br />
<br />
A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server.<br />
<br />
Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack.<br />
<br />
This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.
Impacto
Puntuación base 3.x
9.10
Gravedad 3.x
CRÍTICA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:miyagawa:plack\:\:middleware\:\:xsendfile:*:*:*:*:*:perl:*:* | 1.0053 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



