Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://blusparkglobal.com/bluvoyix/ |
|
Wed, 14 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The vulnerability exists in BLUVOYIX due to an improper password storage implementation and subsequent exposure via unauthenticated APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable users API to retrieve the plaintext passwords of all user users. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in using an exposed admin email address and password. | |
| Title | Plaintext Passwords Vulnerability in BLUVOYIX | |
| Weaknesses | CWE-200 CWE-312 CWE-522 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: MHV
Published:
Updated: 2026-01-14T14:58:59.484Z
Reserved: 2026-01-06T23:20:59.365Z
Link: CVE-2026-22240
Updated: 2026-01-14T14:58:51.452Z
Status : Awaiting Analysis
Published: 2026-01-14T15:16:05.413
Modified: 2026-01-14T16:25:12.057
Link: CVE-2026-22240
No data.
OpenCVE Enrichment
No data.