The MP3::Info module attempts to load and run a module relative to the current working directory. If a local user ran an application that uses MP3::Info in an attacker-controlled directory, it would lead to arbitrary code execution.
Downgrading severity, this module is not widely used and requires significant attacker/victim interaction.
Created perl-MP3-Info tracking bugs for this issue: Affects: fedora-all [bug 1189334] Affects: epel-5 [bug 1189335]
I checked the code of perl-MP3-Info and couldn't find any code doing what you describe. There are no issues of such nature reported upstream either. I would appreciate some more information on this matter as I can't see anything to fix here.
I believe this report is bogus. Closing.