Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 26 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flagforgectf
Flagforgectf flagforge |
|
Vendors & Products |
Flagforgectf
Flagforgectf flagforge |
Thu, 25 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1. | |
Title | FlagForgeCTF's Improper Session Handling Allows Access After Logout | |
Weaknesses | CWE-384 CWE-613 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-25T15:15:45.438Z
Reserved: 2025-09-22T14:34:03.472Z
Link: CVE-2025-59841

No data.

Status : Awaiting Analysis
Published: 2025-09-25T16:15:35.940
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-59841

No data.

Updated: 2025-09-26T11:35:41Z