Vulnerability Description
Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Flagforge | Flagforge | >= 2.2, < 2.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/FlagForgeCTF/flagForge/commit/304b6c82a4f76871b336404b91e5cddPatch
- https://github.com/FlagForgeCTF/flagForge/security/advisories/GHSA-h6pr-4cwv-6cjVendor Advisory
FAQ
What is CVE-2025-59841?
CVE-2025-59841 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to acce...
How severe is CVE-2025-59841?
CVE-2025-59841 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-59841?
Check the references section above for vendor advisories and patch information. Affected products include: Flagforge Flagforge.