Vulnerability Description
newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Newbee-Mall Project | Newbee-Mall | <= 1.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/newbee-ltd/newbee-mall/issues/119ExploitIssue TrackingVendor Advisory
- https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-eThird Party Advisory
FAQ
What is CVE-2026-26219?
CVE-2026-26219 is a vulnerability with a CVSS score of 9.1 (CRITICAL). newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who ob...
How severe is CVE-2026-26219?
CVE-2026-26219 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-26219?
Check the references section above for vendor advisories and patch information. Affected products include: Newbee-Mall Project Newbee-Mall.