CVE-2024-58134

8.1 HIGH
Published: May 03, 2025 Modified: October 20, 2025

Description

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies.Β  An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/hashcat/hashcat/pull/4090
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Issue Tracking Patch
https://github.com/mojolicious/mojo/pull/1791
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Issue Tracking Patch
https://github.com/mojolicious/mojo/pull/2200
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Issue Tracking Patch
https://github.com/mojolicious/mojo/pull/2252
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://lists.debian.org/debian-perl/2025/05/msg00016.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://lists.debian.org/debian-perl/2025/05/msg00017.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://lists.debian.org/debian-perl/2025/05/msg00018.html
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
https://www.synacktiv.com/publications/baking-mojolicious-cookies
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Exploit

11 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.1 / 10.0
EPSS (Exploit Probability)
0.1%
20th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mojolicious