Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.
History

Mon, 29 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Flagforgectf
Flagforgectf flagforge
Vendors & Products Flagforgectf
Flagforgectf flagforge

Thu, 25 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
Description Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.
Title FlagForgeCTF's Improper Session Handling Allows Access After Logout
Weaknesses CWE-384
CWE-613
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-29T15:48:10.233Z

Reserved: 2025-09-22T14:34:03.472Z

Link: CVE-2025-59841

cve-icon Vulnrichment

Updated: 2025-09-29T15:48:07.454Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-25T16:15:35.940

Modified: 2025-09-26T14:32:19.853

Link: CVE-2025-59841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-26T11:35:41Z