Vulnerability Description
Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment. A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server. Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack. This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Miyagawa | Plack\ | <= 1.0053, \ |
Related Weaknesses (CWE)
References
- https://metacpan.org/release/MIYAGAWA/Plack-1.0053/changesRelease Notes
- https://metacpan.org/release/MIYAGAWA/Plack-1.0053/view/lib/Plack/Middleware/XSeProduct
- https://nvd.nist.gov/vuln/detail/CVE-2025-61780US Government Resource
FAQ
What is CVE-2026-7381?
CVE-2026-7381 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the cl...
How severe is CVE-2026-7381?
CVE-2026-7381 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-7381?
Check the references section above for vendor advisories and patch information. Affected products include: Miyagawa Plack\.