newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
References
| Link | Resource |
|---|---|
| https://github.com/newbee-ltd/newbee-mall/issues/119 | Exploit Issue Tracking Vendor Advisory |
| https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking | Third Party Advisory |
Configurations
History
25 Feb 2026, 16:40
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:* | |
| References | () https://github.com/newbee-ltd/newbee-mall/issues/119 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking - Third Party Advisory | |
| First Time |
Newbee-mall Project
Newbee-mall Project newbee-mall |
12 Feb 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-12 19:15
Updated : 2026-02-25 16:40
NVD link : CVE-2026-26219
Mitre link : CVE-2026-26219
CVE.ORG link : CVE-2026-26219
JSON object : View
Products Affected
newbee-mall_project
- newbee-mall
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
