PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the application uses a hard-coded, static default password for all newly created student accounts. This results in mass account takeover, allowing any attacker to log in as any student once the password is known.
References
| Link | Resource |
|---|---|
| https://github.com/Praskla-Technology/assessment-placipy/security/advisories/GHSA-6537-cf56-j9w2 | Mitigation Vendor Advisory |
Configurations
History
11 Feb 2026, 19:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:prasklatechnology:placipy:1.0.0:*:*:*:*:*:*:* | |
| First Time |
Prasklatechnology
Prasklatechnology placipy |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/Praskla-Technology/assessment-placipy/security/advisories/GHSA-6537-cf56-j9w2 - Mitigation, Vendor Advisory |
06 Feb 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 19:16
Updated : 2026-02-11 19:03
NVD link : CVE-2026-25753
Mitre link : CVE-2026-25753
CVE.ORG link : CVE-2026-25753
JSON object : View
Products Affected
prasklatechnology
- placipy
CWE
CWE-259
Use of Hard-coded Password
