CVE-2026-7381 – Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting

CVE ID :CVE-2026-7381

Published : April 29, 2026, 11:16 p.m. | 1 hour, 1 minute ago

Description :Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting.

Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment.

A malicious client can set the X-Sendfile-Type header to „X-Accel-Redirect“ to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server.

Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack.

This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the „X-Accel-Redirect“ type.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…