CVE-2018-25160
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
27/02/2026
Last modified:
18/03/2026
Description
HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend.<br />
<br />
For example, if an application uses memcached for session storage, then it may be possible for a remote attacker to inject memcached commands in the session id value.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tokuhirom:http\:\:session2:*:*:*:*:*:perl:*:* | 1.09 (including) |
To consult the complete list of CPE names with products and versions, see this page



