Session ID Generation Flaw in WebDyne::Session by WebDyne
CVE-2026-5084
Currently unrated
What is CVE-2026-5084?
WebDyne::Session, particularly in versions up to 2.075, contains a vulnerability that leads to insecure generation of session IDs. The session ID is produced using an MD5 hash that is seeded with a predictable value derived from the built-in rand() function. This method results in session IDs that can be easily predicted by attackers, allowing them to potentially gain unauthorized access to systems by guessing valid session IDs. The flaw resides in the insufficient randomness of the seed, making the security of the session handling mechanism inadequate for protecting sensitive information.
Affected Version(s)
WebDyne::Session 0 <= 2.075
