Description
A vulnerability was determined in code-projects Chat System 1.0. Affected is an unknown function of the file update_user.php of the component MD5 Hash Handler. This manipulation of the argument Password causes use of weak hash. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized.
Problem types
Product status
Timeline
| 2026-04-26: | Advisory disclosed |
| 2026-04-26: | VulDB entry created |
| 2026-04-26: | VulDB entry last update |
Credits
c4ttr4ck (VulDB User)
References
gist.github.com/higordiego/84ae7f08f5c23debebf309de3920bda2
vuldb.com/vuln/359678 (VDB-359678 | code-projects Chat System MD5 Hash update_user.php weak hash)
vuldb.com/vuln/359678/cti (VDB-359678 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/800384 (Submit #800384 | code-projects Chat System Using PHP 1.0 nsecure Direct Object Reference (IDOR) + SQL Injection + Weak Pa)
gist.github.com/higordiego/84ae7f08f5c23debebf309de3920bda2
code-projects.org/