Vulnerability Description
Quick.Cart allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensolution | Quick.Cart | 6.7 |
Related Weaknesses (CWE)
References
- https://cert.pl/posts/2026/02/CVE-2026-23796Third Party Advisory
- https://opensolution.org/sklep-internetowy-quick-cart.htmlProduct
FAQ
What is CVE-2026-23796?
CVE-2026-23796 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Quick.Cart allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID ...
How severe is CVE-2026-23796?
CVE-2026-23796 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-23796?
Check the references section above for vendor advisories and patch information. Affected products include: Opensolution Quick.Cart.