Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.
Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.