{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T13:06:46.126","vulnerabilities":[{"cve":{"id":"CVE-2026-21868","sourceIdentifier":"security-advisories@github.com","published":"2026-01-08T01:15:55.483","lastModified":"2026-01-20T18:47:56.220","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Flag Forge is a Capture The Flag (CTF) platform. Versions 2.3.2 and below have a Regular Expression Denial of Service (ReDoS) vulnerability in the user profile API endpoint (/api/user/[username]). The application constructs a regular expression dynamically using unescaped user input (the username parameter). An attacker can exploit this by sending a specially crafted username containing regex meta-characters (e.g., deeply nested groups or quantifiers), causing the MongoDB regex engine to consume excessive CPU resources. This can lead to Denial of Service for other users. The issue is fixed in version 2.3.3. To workaround this issue, implement a Web Application Firewall (WAF) rule to block requests containing regex meta-characters in the URL path."},{"lang":"es","value":"Flag Forge es una plataforma de Capture The Flag (CTF). Las versiones 2.3.2 e inferiores tienen una vulnerabilidad de denegación de servicio por expresión regular (ReDoS) en el endpoint de la API de perfil de usuario (/api/user/[username]). La aplicación construye una expresión regular dinámicamente utilizando entrada de usuario sin escapar (el parámetro username). Un atacante puede explotar esto enviando un nombre de usuario especialmente diseñado que contenga metacaracteres de regex (p. ej., grupos anidados profundamente o cuantificadores), lo que provoca que el motor de regex de MongoDB consuma recursos excesivos de CPU. Esto puede llevar a la denegación de servicio para otros usuarios. El problema está solucionado en la versión 2.3.3. Como solución alternativa a este problema, implemente una regla de cortafuegos de aplicaciones web (WAF) para bloquear las solicitudes que contengan metacaracteres de regex en la ruta URL."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:flagforge:flagforge:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.3.3","matchCriteriaId":"FF98A9BF-17BE-4FBF-9D72-725005A165C8"}]}]}],"references":[{"url":"https://github.com/FlagForgeCTF/flagForge/security/advisories/GHSA-949h-9824-xmcx","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}