Vulnerability Description
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dbook | Www\ | <= 1.000, \ |
Related Weaknesses (CWE)
References
- https://metacpan.org/release/DBOOK/WWW-OAuth-1.000/source/lib/WWW/OAuth.pm#L86Issue TrackingProduct
- https://perldoc.perl.org/functions/randThird Party Advisory
- https://security.metacpan.org/docs/guides/random-data-for-security.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2026/02/13/1Mailing ListThird Party Advisory
FAQ
What is CVE-2025-40905?
CVE-2025-40905 is a vulnerability with a CVSS score of 7.3 (HIGH). WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
How severe is CVE-2025-40905?
CVE-2025-40905 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-40905?
Check the references section above for vendor advisories and patch information. Affected products include: Dbook Www\.