Bug#1135324: libplack-perl: CVE-2026-7381

Salvatore Bonaccorso carnil at debian.org
Fri May 1 07:04:51 BST 2026


Source: libplack-perl
Version: 1.0051-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for libplack-perl.

CVE-2026-7381[0]:
| Plack::Middleware::XSendfile versions through 1.0053 for Perl can
| allow client-controlled path rewriting.
| Plack::Middleware::XSendfile allows the variation setting (sendfile
| type) to be set by the client via the X-Sendfile-Type header, if it
| is not considered in the middleware constructor or the Plack
| environment.  A malicious client can set the X-Sendfile-Type header
| to "X-Accel-Redirect" to services running behind nginx reverse
| proxies, and then set the X-Accel-Mapping to map the path to an
| arbitrary file on the server.  Since 1.0053,
| Plack::Middleware::XSendfile is deprecated and will be removed from
| future releases of Plack.  This is similar to CVE-2025-61780 for
| Rack::Sendfile, although Plack::Middleware::XSendfile has some
| mitigations that disallow regular expressions to be used in the
| mapping, and only apply the mapping for the "X-Accel-Redirect" type.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-7381
    https://www.cve.org/CVERecord?id=CVE-2026-7381
[1] https://lists.security.metacpan.org/cve-announce/msg/39467666/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-perl-maintainers mailing list