Описание
ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
Ссылки
- Third Party Advisory
- ProductVendor Advisory
- Third Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:forlogic:qualiex:1.0:*:*:*:*:*:*:*
cpe:2.3:a:forlogic:qualiex:3.0:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01418
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-672
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse.
EPSS
Процентиль: 80%
0.01418
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-672