Description
I hope this only happens in the demo, but isn't it a really bad practice and a massive security vulnerability to store plain text passwords or to even be able to view them at all?
In the demo, I'm able to view the password for every mailbox, which made me very concerned. Please correct me if I'm wrong, but I believe passwords should be hashed and there should be no easy way to un-hash it. In other words, no one should be able to revert the hash back to plain text, not even the API server.

I haven't tried the self-hosted version yet, so I don't know if this is only the case with the demo showcase.
A quick glimpse at the source code tells me that you hash them with MD5, which could be good enough. But for improved security, I would personally use safer hashing algorithms such as Argon2id or scrypt as suggested by this OWASP article.