for a victim and later hijack the authenticated session.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Quick.Cart allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | |
| Title | Session Fixation in Quick.Cart | |
| Weaknesses | CWE-384 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-02-05T14:19:55.348Z
Reserved: 2026-01-16T13:19:49.040Z
Link: CVE-2026-23796
Updated: 2026-02-05T14:19:50.281Z
Status : Awaiting Analysis
Published: 2026-02-05T12:16:01.743
Modified: 2026-02-05T14:57:20.563
Link: CVE-2026-23796
No data.
OpenCVE Enrichment
No data.