CVE-2020-24029

Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token."
References
Link Resource
https://github.com/underprotection/CVE-2020-24029 Third Party Advisory
https://qualiex.com Product Vendor Advisory
https://github.com/underprotection/CVE-2020-24029 Third Party Advisory
https://qualiex.com Product Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:forlogic:qualiex:1.0:*:*:*:*:*:*:*
cpe:2.3:a:forlogic:qualiex:3.0:*:*:*:*:*:*:*

History

14 Oct 2025, 13:15

Type Values Removed Values Added
Summary (en) Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. (en) Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token."

Information

Published : 2020-09-02 17:15

Updated : 2025-10-14 13:15


NVD link : CVE-2020-24029

Mitre link : CVE-2020-24029

CVE.ORG link : CVE-2020-24029


JSON object : View

Products Affected

forlogic

  • qualiex
CWE
CWE-287

Improper Authentication