Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The problem has been patched in FlagForge version 2.3.1. The fix removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.1 or later to eliminate exposure. There are no workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 29 Sep 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flagforgectf
Flagforgectf flagforge |
|
Vendors & Products |
Flagforgectf
Flagforgectf flagforge |
Fri, 26 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The problem has been patched in FlagForge version 2.3.1. The fix removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.1 or later to eliminate exposure. There are no workarounds for this vulnerability. | |
Title | FlagForgeCTF Exposes User Emails via Public /api/user/[username] API | |
Weaknesses | CWE-359 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-26T17:51:22.644Z
Reserved: 2025-09-22T14:34:03.472Z
Link: CVE-2025-59843

Updated: 2025-09-26T17:35:32.509Z

Status : Awaiting Analysis
Published: 2025-09-26T16:15:49.090
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-59843

No data.

Updated: 2025-09-29T09:30:23Z