Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65020: CWE-285: Improper Authorization in lukevella rallly

0
Medium
VulnerabilityCVE-2025-65020cvecve-2025-65020cwe-285cwe-639cwe-862
Published: Wed Nov 19 2025 (11/19/2025, 17:24:12 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.

AI-Powered Analysis

AILast updated: 11/19/2025, 18:03:20 UTC

Technical Analysis

CVE-2025-65020 is a vulnerability classified under CWE-285 (Improper Authorization), CWE-639 (Authorization Bypass Through User-Controlled Key), and CWE-862 (Missing Authorization) affecting the open-source scheduling and collaboration platform Rallly. The flaw exists in the poll duplication API endpoint (/api/trpc/polls.duplicate) in versions before 4.5.4. Specifically, the endpoint fails to properly verify whether the authenticated user has the right to duplicate a given poll. By modifying the pollId parameter, an attacker with any authenticated account can duplicate polls owned by other users, including private or administrative polls. This bypasses intended access controls and can lead to unauthorized exposure or replication of sensitive scheduling data. The vulnerability is remotely exploitable over the network without requiring elevated privileges or user interaction, making it relatively easy to exploit in environments where Rallly is deployed and accessible. The CVSS 3.1 base score is 6.5, reflecting a medium severity due to the confidentiality and integrity impact but no direct availability impact. Although no active exploits have been reported, the vulnerability poses a risk to organizations relying on Rallly for confidential scheduling and collaboration. The issue was addressed in Rallly version 4.5.4 by implementing proper authorization checks on the poll duplication endpoint to ensure only owners or authorized users can duplicate polls.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized duplication and potential exposure of private or administrative scheduling information. Such data might include sensitive meeting details, participant lists, or strategic planning sessions, which if leaked or misused, could compromise confidentiality and organizational integrity. The impact is particularly significant for sectors with strict data privacy requirements such as finance, healthcare, and government institutions. Unauthorized duplication could also facilitate further social engineering or insider threat activities by revealing internal collaboration patterns. While the vulnerability does not directly impact system availability, the breach of confidentiality and integrity could lead to reputational damage, regulatory penalties under GDPR, and operational disruptions if sensitive information is mishandled. Organizations using Rallly in multi-tenant or public-facing environments are at higher risk due to the ease of exploitation by any authenticated user.

Mitigation Recommendations

The primary mitigation is to upgrade Rallly installations to version 4.5.4 or later, where the vulnerability is patched. Organizations should audit their current Rallly deployments to identify affected versions and apply updates promptly. Additionally, implement strict access controls and monitoring on the Rallly application, including limiting user authentication to trusted personnel and enforcing strong authentication mechanisms. Review and restrict API access permissions to minimize exposure of sensitive endpoints. Employ logging and alerting on suspicious poll duplication activities to detect potential exploitation attempts. For environments where immediate patching is not feasible, consider network-level restrictions to limit access to the Rallly service or deploy web application firewalls (WAFs) with custom rules to detect and block unauthorized pollId parameter manipulations. Finally, educate users about the risks of unauthorized data duplication and encourage reporting of unusual application behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e026693c808727dc91d2e

Added to database: 11/19/2025, 5:46:14 PM

Last enriched: 11/19/2025, 6:03:20 PM

Last updated: 11/21/2025, 3:16:27 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats