In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can display users' password in user editing page.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References
| Link | Resource |
|---|---|
| https://cert.pl/posts/2026/02/CVE-2026-23796 | Third Party Advisory |
| https://opensolution.org/sklep-internetowy-quick-cart.html | Product |
Configurations
History
19 Feb 2026, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert.pl/posts/2026/02/CVE-2026-23796 - Third Party Advisory | |
| References | () https://opensolution.org/sklep-internetowy-quick-cart.html - Product | |
| First Time |
Opensolution
Opensolution quick.cart |
|
| CPE | cpe:2.3:a:opensolution:quick.cart:6.7:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
05 Feb 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 12:16
Updated : 2026-02-19 18:30
NVD link : CVE-2026-23797
Mitre link : CVE-2026-23797
CVE.ORG link : CVE-2026-23797
JSON object : View
Products Affected
opensolution
- quick.cart
CWE
CWE-256
Plaintext Storage of a Password
