Mite for Perl before 0.013000 generates code with the current working directory ('.') added to the @INC path similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. This affects the Mite distribution itself, and other distributions that contain code generated by Mite.
History

Tue, 01 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 02:00:00 +0000

Type Values Removed Values Added
Description Mite for Perl before 0.013000 generates code with the current working directory ('.') added to the @INC path similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. This affects the Mite distribution itself, and other distributions that contain code generated by Mite.
Title Mite for Perl generates code with an untrusted search path vulnerability
Weaknesses CWE-427
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2025-04-01T18:28:05.280Z

Reserved: 2025-03-24T22:42:06.810Z

Link: CVE-2025-30672

cve-icon Vulnrichment

Updated: 2025-04-01T18:28:00.197Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-01T02:15:16.390

Modified: 2025-04-01T20:26:11.547

Link: CVE-2025-30672

cve-icon Redhat

No data.