PT-2025-39658 · Flagforge · Flagforge

Published

2025-09-26

·

Updated

2025-09-26

·

CVE-2025-59843

CVSS v4.0
6.9
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

**Name of the Vulnerable Software and Affected Versions**

Flag Forge versions 2.0.0 through 2.3.0

**Description**

Flag Forge, a Capture The Flag (CTF) platform, has an issue where the public API endpoint `/api/user/[username]` returns user email addresses in its JSON response. This exposes sensitive user information. The issue is addressed in version 2.3.1, which removes email addresses from public API responses while maintaining the endpoint's public accessibility. The vulnerable parameter is `username`.

**Recommendations**

Upgrade to Flag Forge version 2.3.1 or later.

Fix

Weakness Enumeration

Related Identifiers

CVE-2025-59843

Affected Products

Flagforge