CVE-2026-26219

newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-12 19:15

Updated : 2026-02-25 16:40


NVD link : CVE-2026-26219

Mitre link : CVE-2026-26219

CVE.ORG link : CVE-2026-26219


JSON object : View

Products Affected

newbee-mall_project

  • newbee-mall
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm