Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65021: CWE-285: Improper Authorization in lukevella rallly

0
Critical
VulnerabilityCVE-2025-65021cvecve-2025-65021cwe-285cwe-862cwe-639
Published: Wed Nov 19 2025 (11/19/2025, 17:24:31 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not own by manipulating the pollId parameter in the request. This allows unauthorized users to finalize other users’ polls and convert them into events without proper authorization checks, potentially disrupting user workflows and causing data integrity and availability issues. This issue has been patched in version 4.5.4.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:04:04 UTC

Technical Analysis

CVE-2025-65021 is an authorization bypass vulnerability classified under CWE-285 (Improper Authorization), CWE-862 (Missing Authorization), and CWE-639 (Authorization Bypass Through User-Controlled Key). It affects Rallly, an open-source scheduling and collaboration platform, in versions prior to 4.5.4. The flaw resides in the poll finalization feature, where the application fails to properly verify that the authenticated user finalizing a poll is the poll owner. By manipulating the pollId parameter in the API or web request, any authenticated user can finalize polls created by others. This results in unauthorized conversion of polls into events, which can disrupt user workflows, cause data integrity issues, and impact availability of scheduling functions. The vulnerability is remotely exploitable over the network without requiring elevated privileges or user interaction beyond authentication. The CVSS v3.1 score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) indicates a critical severity due to high impact on integrity and availability, with no confidentiality impact. Although no public exploits are currently known, the simplicity of exploitation and the critical nature of the flaw necessitate urgent remediation. The vendor addressed the issue in Rallly version 4.5.4 by implementing proper authorization checks on poll finalization requests.

Potential Impact

For European organizations, this vulnerability poses significant risks to operational continuity and data integrity within collaborative scheduling environments. Unauthorized poll finalization can disrupt planned meetings and events, causing confusion and potential business process delays. In sectors relying heavily on coordinated scheduling—such as healthcare, education, and government—such disruptions could have amplified consequences. The integrity of scheduling data is compromised, potentially leading to mistrust in the platform and increased administrative overhead to verify and correct unauthorized changes. Availability of the scheduling service may also be affected if multiple polls are prematurely finalized, impacting user productivity. Since the vulnerability requires only authenticated access, insider threats or compromised user accounts could be leveraged to exploit this flaw. The lack of confidentiality impact reduces risk of data leakage but does not diminish the operational impact. Organizations using Rallly in critical workflows must act swiftly to mitigate these risks.

Mitigation Recommendations

The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the vulnerability is patched. Organizations should audit their current deployments to identify affected versions. In addition to patching, implement strict access controls and role-based permissions to limit poll creation and finalization capabilities to trusted users. Monitor logs and audit trails for unusual poll finalization activities, especially those initiated by users who do not own the polls. Employ network segmentation and application-layer firewalls to restrict access to the scheduling platform to authorized personnel only. Educate users about the importance of safeguarding their credentials to prevent exploitation by compromised accounts. For organizations unable to immediately upgrade, consider temporarily disabling the poll finalization feature or restricting it via configuration or custom access controls until patching is feasible. Regularly review and update incident response plans to include scenarios involving manipulation of collaborative scheduling tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e026693c808727dc91d32

Added to database: 11/19/2025, 5:46:14 PM

Last enriched: 11/26/2025, 6:04:04 PM

Last updated: 1/7/2026, 6:44:55 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats