Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65020: CWE-285: Improper Authorization in lukevella rallly

0
Medium
VulnerabilityCVE-2025-65020cvecve-2025-65020cwe-285cwe-639cwe-862
Published: Wed Nov 19 2025 (11/19/2025, 17:24:12 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:03:50 UTC

Technical Analysis

CVE-2025-65020 is a medium-severity vulnerability classified under CWE-285 (Improper Authorization), CWE-639 (Authorization Bypass Through User-Controlled Key), and CWE-862 (Missing Authorization). It affects Rallly, an open-source scheduling and collaboration platform, specifically versions prior to 4.5.4. The vulnerability exists in the poll duplication endpoint (/api/trpc/polls.duplicate), where the pollId parameter is insufficiently validated. Authenticated users can modify this parameter to duplicate polls they do not own, effectively bypassing access control mechanisms. This leads to unauthorized cloning of private or administrative polls, potentially exposing sensitive scheduling information or enabling unauthorized manipulation of poll data. The vulnerability requires no user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS vector indicates low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), but the scope remains unchanged (S:U). The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). Although no known exploits have been reported in the wild, the vulnerability poses a risk to organizations relying on Rallly for sensitive scheduling or collaboration tasks. The issue was publicly disclosed on November 19, 2025, and patched in version 4.5.4. Organizations should upgrade to this version or later to remediate the vulnerability.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure and manipulation of sensitive scheduling information, potentially affecting internal planning, resource allocation, or confidential meetings. The ability to clone private or administrative polls without proper authorization undermines trust in the scheduling platform and could facilitate further social engineering or insider threats. While the vulnerability does not directly impact system availability, the confidentiality and integrity breaches could have operational and reputational consequences, especially for organizations handling sensitive or regulated data. Collaboration platforms are often integral to business continuity; thus, exploitation could disrupt workflows or expose strategic information. The medium severity reflects a moderate risk that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

European organizations using Rallly should immediately upgrade to version 4.5.4 or later, where the vulnerability is patched. Until upgrade, implement strict access controls and monitor API usage for anomalous poll duplication requests. Employ logging and alerting on poll duplication endpoints to detect unauthorized attempts. Conduct an audit of existing polls to identify any unauthorized clones created prior to patching. Consider restricting poll duplication functionality to trusted roles or users, if possible, via configuration or custom access controls. Additionally, enforce strong authentication mechanisms to prevent unauthorized access to the platform. Educate users about the risks of sharing poll links or credentials. Finally, integrate vulnerability scanning and patch management processes to ensure timely updates of open-source tools like Rallly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e026693c808727dc91d2e

Added to database: 11/19/2025, 5:46:14 PM

Last enriched: 11/26/2025, 6:03:50 PM

Last updated: 1/7/2026, 8:54:40 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats