Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31126 | Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1. |
Wed, 08 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flagforge
Flagforge flagforge |
|
| CPEs | cpe:2.3:a:flagforge:flagforge:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flagforge
Flagforge flagforge |
Mon, 29 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flagforgectf
Flagforgectf flagforge |
|
| Vendors & Products |
Flagforgectf
Flagforgectf flagforge |
Thu, 25 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1. | |
| Title | FlagForgeCTF's Improper Session Handling Allows Access After Logout | |
| Weaknesses | CWE-384 CWE-613 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-29T15:48:10.233Z
Reserved: 2025-09-22T14:34:03.472Z
Link: CVE-2025-59841
Updated: 2025-09-29T15:48:07.454Z
Status : Analyzed
Published: 2025-09-25T16:15:35.940
Modified: 2025-10-08T16:31:08.920
Link: CVE-2025-59841
No data.
OpenCVE Enrichment
Updated: 2025-09-26T11:35:41Z
EUVD