{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59843","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-09-22T14:34:03.472Z","datePublished":"2025-09-26T16:03:34.038Z","dateUpdated":"2026-01-28T23:11:20.765Z"},"containers":{"cna":{"title":"FlagForgeCTF Exposes User Emails via Public /api/user/[username] API","problemTypes":[{"descriptions":[{"cweId":"CWE-359","lang":"en","description":"CWE-359: Exposure of Private Personal Information to an Unauthorized Actor","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/FlagForgeCTF/flagForge/security/advisories/GHSA-qqjv-8r5p-7xpj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/FlagForgeCTF/flagForge/security/advisories/GHSA-qqjv-8r5p-7xpj"},{"name":"https://github.com/FlagForgeCTF/flagForge/commit/1b033f1b6e20fbf6df422d5d1afc9b2347528ace","tags":["x_refsource_MISC"],"url":"https://github.com/FlagForgeCTF/flagForge/commit/1b033f1b6e20fbf6df422d5d1afc9b2347528ace"},{"name":"https://github.com/FlagForgeCTF/flagForge/compare/v2.3.1...v2.3.2","tags":["x_refsource_MISC"],"url":"https://github.com/FlagForgeCTF/flagForge/compare/v2.3.1...v2.3.2"},{"name":"https://github.com/FlagForgeCTF/flagForge/releases/tag/v2.3.1","tags":["x_refsource_MISC"],"url":"https://github.com/FlagForgeCTF/flagForge/releases/tag/v2.3.1"}],"affected":[{"vendor":"FlagForgeCTF","product":"flagForge","versions":[{"version":">= 2.0.0, < 2.3.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-28T23:11:20.765Z"},"descriptions":[{"lang":"en","value":"Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.2, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The fix, intended for release in 2.3.1 but only available starting in version 2.3.2, removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.2 or later to eliminate exposure. There are no workarounds for this vulnerability."}],"source":{"advisory":"GHSA-qqjv-8r5p-7xpj","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-26T17:35:23.214953Z","id":"CVE-2025-59843","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-26T17:51:22.644Z"}}]}}