newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
References
| Link | Resource |
|---|---|
| https://github.com/newbee-ltd/newbee-mall/issues/119 | Exploit Issue Tracking Vendor Advisory |
| https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-12 19:15
Updated : 2026-02-25 16:40
NVD link : CVE-2026-26219
Mitre link : CVE-2026-26219
CVE.ORG link : CVE-2026-26219
JSON object : View
Products Affected
newbee-mall_project
- newbee-mall
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
