CVE-2025-27551 Affecting libdbix-class-encodedcolumn-perl package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-LIBDBIXCLASSENCODEDCOLUMNPERL-9519411
  • published27 Mar 2025
  • disclosed26 Mar 2025

Introduced: 26 Mar 2025

NewCVE-2025-27551  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable libdbix-class-encodedcolumn-perl.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libdbix-class-encodedcolumn-perl package and not the libdbix-class-encodedcolumn-perl package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes.

This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm.

This issue affects DBIx::Class::EncodedColumn until 0.00032.