CWE-836: Use of Password Hash Instead of Password for Authentication

low-risk

The product records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2023-34132 9.8 70.3%
CVE-2017-7927 7.3 1.7%
CVE-2022-32282 8.8 0.5%
CVE-2021-23857 10.0 0.4%
CVE-2023-23450 6.2 0.3%
CVE-2023-23614 8.8 0.2%
CVE-2025-48925 4.3 0.1%
CVE-2023-39546 8.8 0.1%
CVE-2025-64471 4.9 0.1%
CVE-2025-52543 7.5 0.0%
3
/ 100
low-risk
Active Threat 3/50 · Minimal
Exploit Availability 0/50 · Minimal