CVE Vulnerabilities

CVE-2024-58134

Use of Hard-coded Cryptographic Key

Published: May 03, 2025 | Modified: Jun 17, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io minimus.io echohq.com

Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the applications class name, as a HMAC session secret by default.

These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

Weakness

The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

Affected Software

Name Vendor Start Version End Version
Mojolicious Mojolicious 0.999922 (including) 9.40 (including)
Libmojolicious-perl Ubuntu focal *

Potential Mitigations

References