Home

Description

Ecommerce Systempay 1.0 contains a weak cryptographic implementation vulnerability that allows attackers to brute force the 16-character production secret key used for payment signature generation. Attackers can extract payment form data and signatures from POST requests to the payment endpoint, then use SHA1 hash comparison to iteratively test key candidates until discovering the correct production key, enabling them to forge valid payment signatures and manipulate transaction amounts.

PUBLISHED Reserved 2026-02-06 | Published 2026-05-13 | Updated 2026-05-14 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Use of Weak Hash

Product status

1.0
affected

Credits

live3 finder

References

www.exploit-db.com/exploits/48017 (ExploitDB-48017) exploit

paiement.systempay.fr/doc/fr-FR/ (Official Product Homepage) product

paiement.systempay.fr/doc/fr-FR/module-de-paiement-gratuit/ (Product Reference) product

www.vulncheck.com/...ce-systempay-production-key-brute-force (VulnCheck Advisory: Ecommerce Systempay 1.0 Production Key Brute Force) third-party-advisory

cve.org (CVE-2020-37168)

nvd.nist.gov (CVE-2020-37168)

Download JSON