๐Ÿ” CVE Alert

CVE-2026-8803

LOW 3.7

opensourcepos Open Source Point of Sale Employee Login Employee.php login weak hash

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
5th

A flaw has been found in opensourcepos Open Source Point of Sale up to 3.4.2. Impacted is the function Login of the file app/Models/Employee.php of the component Employee Login. This manipulation causes use of weak hash. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. The vendor explains: "[T]he code is still there to allow the upgrade path to work. The default password is initially seeded with the old hash function, but then migrated to a newer one after login. [T]he hash version check might be cleaned up in the future. Currently it's not actively in use as any password change will use a newer hash function."

CWE CWE-328 CWE-327
Vendor opensourcepos
Product open source point of sale
Published May 18, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for opensourcepos open source point of sale

Be the first to know when new low vulnerabilities affecting opensourcepos open source point of sale are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

opensourcepos / Open Source Point of Sale
3.4.0 3.4.1 3.4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/364436 vuldb.com: https://vuldb.com/vuln/364436/cti vuldb.com: https://vuldb.com/submit/802561

Credits

๐Ÿ” Kamran Saifullah (VulDB User) VulDB CNA Team