CVE-2026-26219

newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*

History

25 Feb 2026, 16:40

Type Values Removed Values Added
Summary
  • (es) newbee-mall almacena y verifica las contraseñas de usuario utilizando un algoritmo de hash MD5 sin sal. La implementación no incorpora sales por usuario ni controles de coste computacional, lo que permite a los atacantes que obtienen hashes de contraseñas a través de la exposición de la base de datos, la fuga de copias de seguridad u otros vectores de compromiso recuperar rápidamente credenciales en texto plano mediante ataques fuera de línea.
CPE cpe:2.3:a:newbee-mall_project:newbee-mall:*:*:*:*:*:*:*:*
References () https://github.com/newbee-ltd/newbee-mall/issues/119 - () https://github.com/newbee-ltd/newbee-mall/issues/119 - Exploit, Issue Tracking, Vendor Advisory
References () https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking - () https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking - Third Party Advisory
First Time Newbee-mall Project
Newbee-mall Project newbee-mall

12 Feb 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-12 19:15

Updated : 2026-02-25 16:40


NVD link : CVE-2026-26219

Mitre link : CVE-2026-26219

CVE.ORG link : CVE-2026-26219


JSON object : View

Products Affected

newbee-mall_project

  • newbee-mall
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm