CVE-2026-45179
Received Received - Intake
IP Address Leak in Plack Middleware Statsd

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: CPANSec

Description
Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses. If the communication channel to the statsd daemon is not secured (for example, by sending UDP packets to a host on another network), then users' IP addresses may be leaked. Since version 0.9.0, the IP address is no longer logged to statsd unless configured. When configured, an HMAC signature of the IP address is logged instead.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-11
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
robrwo plack_middleware_statsd to 0.9.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-319 The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The CVE-2026-45179 vulnerability affects versions of Plack::Middleware::Statsd prior to 0.9.0. It involves the potential leakage of sensitive information, specifically users' IP addresses, when the communication channel to the statsd daemon is unsecured, such as through UDP packets sent over an unprotected network.

In these affected versions, IP addresses are logged directly to statsd, which can expose them to unauthorized parties. Starting with version 0.9.0, IP addresses are no longer logged by default, and if logging is configured, an HMAC signature of the IP address is used instead to prevent plaintext exposure.


How can this vulnerability impact me? :

This vulnerability can lead to the exposure of users' IP addresses if the communication channel to the statsd daemon is not secured. Such exposure can compromise user privacy and potentially allow attackers to track or identify users based on their IP information.

Since the IP addresses are transmitted in cleartext in affected versions, attackers who can intercept the network traffic may obtain this sensitive information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring network traffic for unsecured communication channels to the statsd daemon, especially UDP packets sent over unprotected networks that may contain user IP addresses in plaintext.

You can use network packet capture tools such as tcpdump or Wireshark to inspect UDP traffic to the statsd daemon and check if user IP addresses are being transmitted in cleartext.

  • Use tcpdump to capture UDP packets to the statsd server: sudo tcpdump -i <interface> udp and host <statsd_server_ip>
  • Analyze captured packets with Wireshark to look for user IP addresses sent in plaintext.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, upgrade Plack::Middleware::Statsd to version 0.9.0 or later, where IP addresses are no longer logged in plaintext.

If upgrading is not immediately possible, ensure that the communication channel to the statsd daemon is secured, for example by avoiding sending UDP packets over untrusted networks.

Additionally, configure the middleware to log an HMAC signature of the IP address instead of the plaintext IP address to prevent sensitive information leakage.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart