CVE-2025-15578
Published: 16 February 2026
Summary
CVE-2025-15578 is a critical-severity PRNG (CWE-338) vulnerability in Teejay Maypole. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-23 (Session Authenticity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring identification, reporting, and timely correction of the insecure session ID generation flaw in Maypole.
Requires secure management of authenticators, including generation with sufficient entropy to prevent predictable session IDs based on weak seeds like time, rand(), and PID.
Protects the authenticity of sessions against hijacking attacks enabled by the CVE's predictable session ID generation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly enables remote exploitation of a public-facing Perl web framework (T1190) via predictable session IDs, allowing use of guessed web session tokens for hijacking (T1550.004).
NVD Description
Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
Deeper analysisAI
CVE-2025-15578 is a vulnerability in Maypole versions 2.10 through 2.13 for Perl, where session IDs are generated insecurely. The session ID seeding relies on the system time, which is exposed via HTTP response headers, a call to Perl's built-in rand() function, and the process ID (PID). This results in predictable session IDs, mapped to CWE-338 (Use of Cryptographically Weak Random Number Generator), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue was published on 2026-02-16.
The vulnerability enables remote attackers to exploit it over the network with low attack complexity, requiring no privileges, no user interaction, and no change in scope. Attackers can predict session IDs due to the guessable seeds, allowing potential session hijacking, fixation, or other manipulations that compromise user sessions and lead to high impacts on confidentiality, integrity, and availability.
The provided reference points to the vulnerable source code in Maypole's Session.pm at line 43: https://metacpan.org/dist/Maypole/source/lib/Maypole/Session.pm#L43. No additional advisories or patch details are available in the given information.
Details
- CWE(s)