Vulnerability Details CVE-2020-24029
Because of unauthenticated password changes in ForLogic Qualiex v1 and v3, customer and admin permissions and data can be accessed via a simple request. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "corrected in all maintained versions. Password reset requests are validated against registered user emails and require a valid, short-lived token."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 74.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2020-24029
-
cpe:2.3:a:forlogic:qualiex:1.0
-
cpe:2.3:a:forlogic:qualiex:3.0