CVE-2020-24030

ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
References
Link Resource
https://github.com/underprotection/CVE-2020-24030 Third Party Advisory
https://qualiex.com Product Vendor Advisory
https://github.com/underprotection/CVE-2020-24030 Third Party Advisory
https://qualiex.com Product Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:forlogic:qualiex:1.0:*:*:*:*:*:*:*
cpe:2.3:a:forlogic:qualiex:3.0:*:*:*:*:*:*:*

History

14 Oct 2025, 13:15

Type Values Removed Values Added
Summary (en) ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. (en) ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."

Information

Published : 2020-09-02 17:15

Updated : 2025-10-14 13:15


NVD link : CVE-2020-24030

Mitre link : CVE-2020-24030

CVE.ORG link : CVE-2020-24030


JSON object : View

Products Affected

forlogic

  • qualiex
CWE
CWE-672

Operation on a Resource after Expiration or Release