{"id":"CVE-2025-30673","details":"Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.\n\nSub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672","modified":"2026-04-10T05:24:51.688654Z","published":"2025-04-01T03:15:16Z","references":[{"type":"ARTICLE","url":"https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html"},{"type":"WEB","url":"https://metacpan.org/dist/Sub-HandlesVia/changes#L12"},{"type":"WEB","url":"https://metacpan.org/release/TOBYINK/Sub-HandlesVia-0.050001/source/lib/Sub/HandlesVia/Mite.pm#L114"}],"schema_version":"1.7.5"}