This vulnerability occurs when an application stores user passwords in a format that can be easily reversed or decrypted back to their original plaintext form. This practice, often called storing 'recoverable' passwords, defeats the core purpose of password protection. It allows anyone with access to the stored data—including attackers who breach the system or even malicious insiders—to obtain and reuse the actual passwords on other accounts, offering no real security advantage over storing them in plain text.
When passwords are stored in a recoverable format, such as using weak or reversible encryption instead of a proper one-way hash, the system inherently retains the ability to convert them back. This creates a single point of failure: if the storage is compromised or accessed by an unauthorized party, every password becomes immediately usable for account takeover and credential stuffing attacks across other services. The risk is identical to storing plaintext passwords, as the decryption key or method is typically accessible within the application's environment. From a security perspective, there is no legitimate operational need for developers or system administrators to retrieve a user's original password. Standard authentication should compare a one-way hash of the entered password against a stored hash. Any design that requires password recovery is flawed; a secure system should only offer a password reset function. Relying on reversible storage undermines user trust and system integrity, as it enables abuse by both external attackers and privileged insiders who can decrypt credentials at will.
Impact: Gain Privileges or Assume Identity
User's passwords may be revealed.
Impact: Gain Privileges or Assume Identity
Revealed passwords may be reused elsewhere to impersonate the users in question.
cjava
//Diagnostic Mode* return(1);}
javaasp.netHigh