CVE-2025-61777 PUBLISHED

FlagForge Allows Unauthenticated Badge Template API Access

Assigner: GitHub_M
Reserved: 30.09.2025 Published: 06.10.2025 Updated: 06.10.2025

Flag Forge is a Capture The Flag (CTF) platform. Starting in version 2.0.0 and prior to version 2.3.2, the /api/admin/badge-templates (GET) and /api/admin/badge-templates/create (POST) endpoints previously allowed access without authentication or authorization. This could have enabled unauthorized users to retrieve all badge templates and sensitive metadata (createdBy, createdAt, updatedAt) and/or create arbitrary badge templates in the database. This could lead to data exposure, database pollution, or abuse of the badge system. The issue has been fixed in FlagForge v2.3.2. GET, POST, UPDATE, and DELETE endpoints now require authentication. Authorization checks ensure only admins can access and modify badge templates. No reliable workarounds are available.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
CVSS Score: 9.4

Product Status

Vendor FlagForgeCTF
Product flagForge
Versions
  • Version >= 2.0.0, < 2.3.2 is affected

References

Problem Types

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE
  • CWE-284: Improper Access Control CWE
  • CWE-306: Missing Authentication for Critical Function CWE