We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Reserved 2025-04-07 | Published 2025-05-03 | Updated 2025-05-12 | Assigner CPANSecCWE-321 Use of Hard-coded Cryptographic Key
Antoine Cervoise from Synacktiv
Jakub Kramarz
Lukas Atkinson
github.com/mojolicious/mojo/pull/1791
github.com/mojolicious/mojo/pull/2200
www.synacktiv.com/publications/baking-mojolicious-cookies
medium.com/...rity-problems-through-security-by-13da7c225802
metacpan.org/...I/Mojolicious-9.39/source/lib/Mojolicious.pm
github.com/hashcat/hashcat/pull/4090
Support options