Skip to content

Commit e1df577

Browse files
1 parent 41d956f commit e1df577

4 files changed

Lines changed: 123 additions & 1 deletion

File tree

advisories/unreviewed/2025/04/GHSA-76h8-9q54-37cc/GHSA-76h8-9q54-37cc.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-76h8-9q54-37cc",
4-
"modified": "2025-04-08T18:34:45Z",
4+
"modified": "2026-02-17T00:30:18Z",
55
"published": "2025-04-08T18:34:45Z",
66
"aliases": [
77
"CVE-2025-26637"
@@ -22,6 +22,10 @@
2222
{
2323
"type": "WEB",
2424
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "http://seclists.org/fulldisclosure/2026/Feb/15"
2529
}
2630
],
2731
"database_specific": {
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9gww-cr64-679c",
4+
"modified": "2026-02-17T00:30:18Z",
5+
"published": "2026-02-17T00:30:18Z",
6+
"aliases": [
7+
"CVE-2026-2439"
8+
],
9+
"details": "Concierge::Sessions versions from 0.8.1 before 0.8.5 for Perl generate insecure session ids. The generate_session_id function in Concierge::Sessions::Base defaults to using the uuidgen command to generate a UUID, with a fallback to using Perl's built-in rand function. Neither of these methods are secure, and attackers are able to guess session_ids that can grant them access to systems. Specifically,\n\n * There is no warning when uuidgen fails. The software can be quietly using the fallback rand() function with no warnings if the command fails for any reason.\n * The uuidgen command will generate a time-based UUID if the system does not have a high-quality random number source, because the call does not explicitly specify the --random option. Note that the system time is shared in HTTP responses.\n * UUIDs are identifiers whose mere possession grants access, as per RFC 9562.\n * The output of the built-in rand() function is predictable and unsuitable for security applications.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2439"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/bwva/Concierge-Sessions/commit/20bb28e92e8fba307c4ff8264701c215be65e73b"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://metacpan.org/release/BVA/Concierge-Sessions-v0.8.4/diff/BVA/Concierge-Sessions-v0.8.5#lib/Concierge/Sessions/Base.pm"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://perldoc.perl.org/5.42.0/functions/rand"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://www.rfc-editor.org/rfc/rfc9562.html#name-security-considerations"
36+
}
37+
],
38+
"database_specific": {
39+
"cwe_ids": [
40+
"CWE-338"
41+
],
42+
"severity": null,
43+
"github_reviewed": false,
44+
"github_reviewed_at": null,
45+
"nvd_published_at": "2026-02-16T22:22:41Z"
46+
}
47+
}
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-m76j-7jh6-jxj5",
4+
"modified": "2026-02-17T00:30:18Z",
5+
"published": "2026-02-17T00:30:18Z",
6+
"aliases": [
7+
"CVE-2025-15578"
8+
],
9+
"details": "Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15578"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://metacpan.org/dist/Maypole/source/lib/Maypole/Session.pm#L43"
20+
}
21+
],
22+
"database_specific": {
23+
"cwe_ids": [
24+
"CWE-338"
25+
],
26+
"severity": null,
27+
"github_reviewed": false,
28+
"github_reviewed_at": null,
29+
"nvd_published_at": "2026-02-16T22:22:40Z"
30+
}
31+
}
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rqh7-4vgv-648p",
4+
"modified": "2026-02-17T00:30:18Z",
5+
"published": "2026-02-17T00:30:18Z",
6+
"aliases": [
7+
"CVE-2025-12062"
8+
],
9+
"details": "The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the fc_load_template function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .html files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .html file types can be uploaded and included.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "ADVISORY",
20+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12062"
21+
},
22+
{
23+
"type": "WEB",
24+
"url": "https://plugins.trac.wordpress.org/changeset/3405282"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/815e5b86-2d1b-4794-b761-dad770393d3e?source=cve"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-22"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-02-17T00:16:17Z"
39+
}
40+
}

0 commit comments

Comments
 (0)