FlagForge Allows Unauthenticated Badge Template API Access
Description
Flag Forge is a Capture The Flag (CTF) platform. Starting in version 2.0.0 and prior to version 2.3.2, the /api/admin/badge-templates (GET) and /api/admin/badge-templates/create (POST) endpoints previously allowed access without authentication or authorization. This could have enabled unauthorized users to retrieve all badge templates and sensitive metadata (createdBy, createdAt, updatedAt) and/or create arbitrary badge templates in the database. This could lead to data exposure, database pollution, or abuse of the badge system. The issue has been fixed in FlagForge v2.3.2. GET, POST, UPDATE, and DELETE endpoints now require authentication. Authorization checks ensure only admins can access and modify badge templates. No reliable workarounds are available.
Affected products
1- Range: >= 2.0.0, < 2.3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/FlagForgeCTF/flagForge/commit/e2121c5fb7a512a49dcd875812c944265fb1a846mitrex_refsource_MISC
- github.com/FlagForgeCTF/flagForge/security/advisories/GHSA-26rx-c53q-rjf9mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.