newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks. | |
| Title | newbee-mall Unsalted MD5 Password Hashing Enables Offline Credential Cracking | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-12T19:59:06.294Z
Reserved: 2026-02-11T20:08:07.944Z
Link: CVE-2026-26219
Updated: 2026-02-12T19:59:02.628Z
Status : Received
Published: 2026-02-12T19:15:52.300
Modified: 2026-02-12T19:15:52.300
Link: CVE-2026-26219
No data.
OpenCVE Enrichment
No data.