Insecure Hashing Algorithm in ChurchCRM v4.5.3 Allows for Password Cracking
CVE-2023-26855 · HIGH Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
Learn more about our Crm Penetration Testing.