CVE-2026-23797

In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can display users' password in user editing page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensolution:quick.cart:6.7:*:*:*:*:*:*:*

History

19 Feb 2026, 18:30

Type Values Removed Values Added
References () https://cert.pl/posts/2026/02/CVE-2026-23796 - () https://cert.pl/posts/2026/02/CVE-2026-23796 - Third Party Advisory
References () https://opensolution.org/sklep-internetowy-quick-cart.html - () https://opensolution.org/sklep-internetowy-quick-cart.html - Product
First Time Opensolution
Opensolution quick.cart
CPE cpe:2.3:a:opensolution:quick.cart:6.7:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9

05 Feb 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-05 12:16

Updated : 2026-02-19 18:30


NVD link : CVE-2026-23797

Mitre link : CVE-2026-23797

CVE.ORG link : CVE-2026-23797


JSON object : View

Products Affected

opensolution

  • quick.cart
CWE
CWE-256

Plaintext Storage of a Password