Plaintext Password Storage in Quick.Cart by OpenSolution
CVE-2026-23797
6.9MEDIUM
What is CVE-2026-23797?
In Quick.Cart, user passwords are stored in plaintext, which poses a significant security risk. Attackers with elevated privileges can access and display these passwords via the user editing page. This issue was identified in version 6.7, which has been confirmed to be vulnerable. Other versions may also be at risk, but they have not been tested or disclosed by the vendor concerning specifics of the vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Quick.Cart 6.7
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Beniamin Jabłoński
