CVE-2025-40930

7.5 HIGH

📋 TL;DR

CVE-2025-40930 is an integer buffer overflow vulnerability in JSON::SIMD Perl module versions before 1.07. When parsing malicious JSON input, it causes a segmentation fault, enabling denial-of-service attacks against applications using this library. Any Perl application using vulnerable JSON::SIMD versions is affected.

💻 Affected Systems

Products:
  • JSON::SIMD Perl module
Versions: All versions before 1.07
Operating Systems: All operating systems running Perl
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing crafted JSON, regardless of configuration

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution or complete system crash leading to persistent downtime

🟠

Likely Case

Application crashes causing denial-of-service, potentially disrupting dependent services

🟢

If Mitigated

Limited service interruption with proper monitoring and rapid recovery procedures

🌐 Internet-Facing: HIGH - JSON parsing is common in web APIs and services exposed to untrusted input
🏢 Internal Only: MEDIUM - Internal applications may still process untrusted JSON from various sources

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Only requires sending crafted JSON to vulnerable endpoint

Exploitation requires ability to send JSON input to vulnerable application

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.07

Vendor Advisory: https://metacpan.org/release/PJUHASZ/JSON-SIMD-1.07/changes

Restart Required: Yes

Instructions:

1. Update JSON::SIMD using CPAN: 'cpan JSON::SIMD'
2. Verify installation of version 1.07 or later
3. Restart all Perl applications using JSON::SIMD

🔧 Temporary Workarounds

Input validation and sanitization

all

Implement strict JSON input validation and size limits before passing to JSON::SIMD

Use alternative JSON parser

all

Temporarily switch to JSON::XS or other JSON parsing libraries

cpan JSON::XS
Update code to use JSON::XS instead of JSON::SIMD

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious JSON payloads
  • Isolate vulnerable applications behind reverse proxies with request filtering

🔍 How to Verify

Check if Vulnerable:

Check installed JSON::SIMD version: 'perl -MJSON::SIMD -e "print $JSON::SIMD::VERSION\n"'

Check Version:

perl -MJSON::SIMD -e "print $JSON::SIMD::VERSION\n"

Verify Fix Applied:

Verify version is 1.07 or higher using same command

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in application logs
  • Unexpected process termination
  • High rate of JSON parsing failures

Network Indicators:

  • Unusually large JSON payloads
  • Repeated JSON requests causing service disruption

SIEM Query:

source="application.log" AND ("segmentation fault" OR "SIGSEGV") AND process="perl"

🔗 References

📤 Share & Export