CVE-2026-24467 Vulnerability Analysis & Exploit Details

CVE-2026-24467
Vulnerability Scoring

9.0
/10
Severe Risk

Cybersecurity professionals consider CVE-2026-24467 an immediate threat requiring urgent mitigation.

Attack Complexity Details

  • Attack Complexity: High
    Exploits require significant effort and special conditions.
  • Attack Vector: Network
    Vulnerability is exploitable over a network without physical access.
  • Privileges Required: None
    No privileges are required for exploitation.
  • Scope: Changed
    Successful exploitation can impact components beyond the vulnerable component.
  • User Interaction: None
    No user interaction is necessary for exploitation.

CVE-2026-24467 Details

Status: Analyzed

Last updated: 🕕 25 Apr 2026, 18:00 UTC
Originally published on: 🕓 20 Apr 2026, 16:16 UTC

Time between publication and last update: 5 days

CVSS Release: version 3

CVSS3 Source

security-advisories@github.com

CVSS3 Type

Secondary

CVSS3 Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2026-24467 Vulnerability Summary

CVE-2026-24467: OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple security weaknesses that together allow reliable account takeover. The primary issue is that password reset tokens do not expire. Once a token is generated, it remains valid indefinitely, even if significant time has passed or if newer tokens are issued for the same account. This allows an attacker to accumulate valid password reset tokens over time and reuse them at any point in the future to reset a victim’s password. A secondary weakness is that password reset tokens are only 8 digits long. While an 8-digit numeric token provides 100,000,000 possible combinations (which is secure enough), the ability to generate large numbers of valid tokens drastically reduces the required number of attempts to guess a valid password reset token. For example, if an attacker generates 2,000 valid tokens, the brute-force effort is reduced to approximately 50,000 attempts, which is a trivially achievable number of requests for an automated attack. (100 requests per second can mathematically find a valid password reset token in 500 seconds.) By combining these flaws, an attacker can mass-generate valid password reset tokens and then brute-force them efficiently until a match is found, allowing the attacker to reset the victim’s password to a value of their choosing. The original password is not required, and the attack can be performed entirely without authentication. This vulnerability enables full account takeover that leads to platform compromise. An unauthenticated remote attacker can reset the password of any registered user account and gain complete access without authentication. Because user email addresses are exposed to other users by design, a single guessed or observed email address is sufficient to compromise even administrator accounts with non-guessable email addresses. This design flaw results in a reliable and scalable account takeover vulnerability that affects any registered user account in the system. Note: The vulnerability does not require OpenAEV to have the email service configured. The exploit does not depend on the target email address to be a real email address. It just needs to be registered to OpenAEV. Successful exploitation allows an unauthenticated remote attacker to access sensitive data (such as the Findings section of a simulation), modify payloads executed by deployed agents to compromise all hosts where agents are installed (therefore the Scope is changed). Users should upgrade to version 2.0.13 to receive a fix.

Assessing the Risk of CVE-2026-24467

Access Complexity Graph

The exploitability of CVE-2026-24467 depends on two key factors: attack complexity (the level of effort required to execute an exploit) and privileges required (the access level an attacker needs).

Exploitability Analysis for CVE-2026-24467

CVE-2026-24467 presents a challenge to exploit due to its high attack complexity, but the absence of privilege requirements still makes it a viable target for skilled attackers. A thorough security review is advised.

Understanding AC and PR

A lower complexity and fewer privilege requirements make exploitation easier. Security teams should evaluate these aspects to determine the urgency of mitigation strategies, such as patch management and access control policies.

Attack Complexity (AC) measures the difficulty in executing an exploit. A high AC means that specific conditions must be met, making an attack more challenging, while a low AC means the vulnerability can be exploited with minimal effort.

Privileges Required (PR) determine the level of system access necessary for an attack. Vulnerabilities requiring no privileges are more accessible to attackers, whereas high privilege requirements limit exploitation to authorized users with elevated access.

CVSS Score Breakdown Chart

Above is the CVSS Sub-score Breakdown for CVE-2026-24467, illustrating how Base, Impact, and Exploitability factors combine to form the overall severity rating. A higher sub-score typically indicates a more severe or easier-to-exploit vulnerability.

CIA Impact Analysis

Below is the Impact Analysis for CVE-2026-24467, showing how Confidentiality, Integrity, and Availability might be affected if the vulnerability is exploited. Higher values usually signal greater potential damage.

  • Confidentiality: High
    Exploiting CVE-2026-24467 can result in unauthorized access to sensitive data, severely compromising data privacy.
  • Integrity: High
    CVE-2026-24467 could allow unauthorized modifications to data, potentially affecting system reliability and trust.
  • Availability: High
    CVE-2026-24467 can disrupt system operations, potentially causing complete denial of service (DoS).

CVE-2026-24467 References

External References

CWE Common Weakness Enumeration

CWE-640

CAPEC Common Attack Pattern Enumeration and Classification

  • Password Recovery Exploitation CAPEC-50 An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure.

Vulnerable Configurations

  • cpe:2.3:a:filigran:openaev:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.11.5:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.11.5:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.17.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.4:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.4:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.5:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.5:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.6:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.6:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.7:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.7:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.8:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.8:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.9:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.9:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.10:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.10:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.11:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.11:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.12:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.12:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.13:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.13:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.14:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.14:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.15:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.15:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.16:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.16:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.17:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.17:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.18:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.18:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.19:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.19:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:1.18.20:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:1.18.20:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:filigran:openaev:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:filigran:openaev:2.0.12:*:*:*:*:*:*:*

Protect Your Infrastructure against CVE-2026-24467: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Other 5 Recently Published CVEs Vulnerabilities

  • CVE-2026-6956 – ATutor is vulnerable to Reflected XSS in /install/install.php endpoint. An attacker can provide a specially crafted URL that, when opened, results ...
  • CVE-2026-6909 – ATutor is vulnerable to Reflected XSS in /install/upgrade.php endpoint. An attacker can provide a specially crafted URL that, when opened, results ...
  • CVE-2026-41951 – Path traversal vulnerability exists in GROWI v7.5.0 and earlier, which may allow an attacker to execute arbitrary EJS templates on the server when ...
  • CVE-2026-40636 – Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. A...
  • CVE-2026-35157 – Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains an improper neutralization of formula elements i...