An arbitrary code execution can be achieved if loading code from untrusted current working directory despite the '.' is removed from @INC. Vulnerability is in XSLoader that uses caller() information to locate .so file to load. If malicious attacker creates directory named `(eval 1)` with malicious binary file in it, it will be loaded if the package calling XSLoader is in parent directory.
CVE assignment:
http://seclists.org/oss-sec/2016/q3/28
Upstream bug:
https://rt.cpan.org/Public/Bug/Display.html?id=115808
Upstream patch:
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7