Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token."
References
| Link | Resource |
|---|---|
| https://github.com/underprotection/CVE-2020-24029 | Third Party Advisory |
| https://qualiex.com | Product Vendor Advisory |
| https://github.com/underprotection/CVE-2020-24029 | Third Party Advisory |
| https://qualiex.com | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token." |
Information
Published : 2020-09-02 17:15
Updated : 2025-10-14 13:15
NVD link : CVE-2020-24029
Mitre link : CVE-2020-24029
CVE.ORG link : CVE-2020-24029
JSON object : View
Products Affected
forlogic
- qualiex
CWE
CWE-287
Improper Authentication
