The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can display users' password in user editing page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | |
| Title | Plaintext password display in Quick.Cart | |
| Weaknesses | CWE-256 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-02-05T14:29:00.428Z
Reserved: 2026-01-16T13:19:49.041Z
Link: CVE-2026-23797
Updated: 2026-02-05T14:28:57.516Z
Status : Awaiting Analysis
Published: 2026-02-05T12:16:01.897
Modified: 2026-02-05T14:57:20.563
Link: CVE-2026-23797
No data.
OpenCVE Enrichment
No data.