Logo zzcms2025 - Database Stores User Passwords in Plaintext

zzcms2025 - Database Stores User Passwords in Plaintext

zzcms2025 - Database Stores User Passwords in Plaintext#

Vulnerability Author: airrudder

Affected Version: ZZCMS 2025

Vendor: http://www.zzcms.net/

Software Download: http://www.zzcms.net/download/zzcms2025.zip

Vulnerable File:

  • /reg/user_save.php 

Vulnerability Description

The user data storage module of the zzcms2025 version has a sensitive information plaintext storage vulnerability. When the system registers/saves user information, it does not hash or encrypt the user's password, but stores it directly in plaintext in the database's user table (e.g., the zzcms_user table). If an attacker gains access to the database, they can directly read all user passwords in plaintext, leading to a complete compromise of user accounts.

Vulnerability Reproduction

Register directly by visiting /reg/userreg.html.

Article Image

In the database, you can find that both the hash value of the registered user's password and the plaintext password are stored in the database.

Article Image

This is a very serious product design flaw. Storing passwords in plaintext can lead to user data leakage incidents.