Home

Description

In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can display users' password in user editing page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2026-01-16 | Published 2026-02-05 | Updated 2026-02-05 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-256 Plaintext Storage of a Password

Product status

Default status
unknown

6.7 (semver)
affected

Credits

Beniamin Jabłoński finder

References

opensolution.org/sklep-internetowy-quick-cart.html product

cert.pl/posts/2026/02/CVE-2026-23796 third-party-advisory

cve.org (CVE-2026-23797)

nvd.nist.gov (CVE-2026-23797)

Download JSON