Home

Description

Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment. A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server. Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack. This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.

PUBLISHED Reserved 2026-04-29 | Published 2026-04-29 | Updated 2026-04-30 | Assigner CPANSec

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

CWE-441 Unintended Proxy or Intermediary

CWE-913 Improper Control of Dynamically-Managed Code Resources

Product status

Default status
unaffected

Any version
affected

Timeline

2025-10-10:Issue for Rack::Sendfile reported
2026-04-27:Issue reported to maintainer of Plack
2025-04-28:Plack 1.0052 released with improved security documentation in Plack::Middleware::XSendfile
2025-04-29:Plack 1.0053 released that deprecates Plack::Middleware::XSendfile

Credits

CPANSec finder

References

metacpan.org/release/MIYAGAWA/Plack-1.0053/changes release-notes

metacpan.org/....0053/view/lib/Plack/Middleware/XSendfile.pm technical-description

nvd.nist.gov/vuln/detail/CVE-2025-61780 related

cve.org (CVE-2026-7381)

nvd.nist.gov (CVE-2026-7381)

Download JSON