CWE-836: Use of Password Hash Instead of Password for Authentication
low-riskThe product records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2023-34132 | 9.8 | 70.3% | — |
| CVE-2017-7927 | 7.3 | 1.7% | — |
| CVE-2022-32282 | 8.8 | 0.5% | — |
| CVE-2021-23857 | 10.0 | 0.4% | — |
| CVE-2023-23450 | 6.2 | 0.3% | — |
| CVE-2023-23614 | 8.8 | 0.2% | — |
| CVE-2025-48925 | 4.3 | 0.1% | — |
| CVE-2023-39546 | 8.8 | 0.1% | — |
| CVE-2025-64471 | 4.9 | 0.1% | — |
| CVE-2025-52543 | 7.5 | 0.0% | — |
3
/ 100
low-risk
Active Threat
3/50 · Minimal
Exploit Availability
0/50 · Minimal