With WPA2-PSK (a.k.a. WPA2-Personal), anyone who knows the network password, and starts capturing traffic just before a target client joins the network, can decrypt the WPA2 (AES-CCMP) encryption on that client's traffic, for that session. So any insecure HTTP traffic, as opposed to TLS-encrypted HTTPS traffic, that the target client sends or receives can be decrypted.
With WPA2-Enterprise (a.k.a. WPA2 with 802.1X), where each user has to enter their own login credentials, such as their own username and password, before they can join the network at all, there is no way to decrypt the WPA2 (AES-CCMP) encryption from other clients' traffic.
Note that networks that allow you to join but pop up a web form that makes you enter credentials are NOT WPA2-Enterprise. Those web forms are called "captive portals", and are a different thing that usually don't provide any kind of encryption.
A universal password for all public-access Wi-Fi networks would not secure anyone's traffic, because it would not be a secret, and encryption requires secrets.