CVE-2025-59841

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59841
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59841.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59841
Aliases
  • GHSA-h6pr-4cwv-6cjg
Published
2025-09-25T15:15:45.438Z
Modified
2025-11-20T12:39:45.861016Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
FlagForgeCTF's Improper Session Handling Allows Access After Logout
Details

Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.

Database specific
{
    "cwe_ids": [
        "CWE-384",
        "CWE-613"
    ]
}
References

Affected packages

Git / github.com/flagforgectf/flagforge

Affected ranges

Type
GIT
Repo
https://github.com/flagforgectf/flagforge
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

ctf
v2

v2.*

v2.2
v2.3