Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2059 articles · 107069 vulns · 37/55 feeds (7d)
← Back to list
7.5
CVE-2014-125112EXPLOITED
MIYAGAWA · Plack::Middleware::Session::Cookie

Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution

Description

Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution. Plack::Middleware::Session::Cookie versions through 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server during deserialization of the cookie data, when there is no secret used to sign the cookie.

Affected Products

VendorProductVersions
MIYAGAWAPlack::Middleware::Session::Cookie0

References

  • https://gist.github.com/miyagawa/2b8764af908a0dacd43d(technical-description)
  • https://metacpan.org/release/MIYAGAWA/Plack-Middleware-Session-0.23-TRIAL/changes(release-notes)

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2014-125112 | MIYAGAWA Plack::Middleware::Session::Cookie up to 0.21 on Perl cookie validation
→ No new info (linked only)
Tier C
oss-security5h ago
CVE-2014-125112: Plack::Middleware::Session::Cookie versions through 0.21 for Perl allows remote code execution
→ No new info (linked only)
CVSS 3.17.5 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-565
Published3/26/2026
Last enriched2h agov3
Tags
CVE-2014-125112
Trending Score62
Source articles4
Independent2
Info Completeness9/14
Missing: epss, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v3
Last enriched 2h ago
v3Tier C2h ago

Updated severity to CRITICAL and added CVE-2014-125112 as a relevant tag.

severitytags
via VulDB
v2Tier C5h ago

Updated severity to HIGH, added CVSS estimate of 7.5, and marked the vulnerability as actively exploited with an exploit available.

severitycvssEstimateexploitAvailableactivelyExploited
via oss-security
v16h ago

Initial creation