CVE-2025-65029: CWE-285: Improper Authorization in lukevella rallly
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to authorize deletions, enabling attackers to remove other users (including poll owners) from polls. This impacts the integrity and availability of poll participation data. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-65029 is an improper authorization vulnerability classified under CWE-285, CWE-639, and CWE-862, found in the open-source scheduling and collaboration tool Rallly, versions prior to 4.5.4. The vulnerability arises from an insecure direct object reference (IDOR) flaw in the poll participant deletion endpoint, which authorizes deletion requests solely based on the participant ID without verifying whether the requesting user owns the poll or has appropriate permissions. As a result, any authenticated user can delete arbitrary participants from any poll, including the poll owner, thereby compromising the integrity and availability of poll participation data. The vulnerability requires authentication but no additional user interaction, and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope remains unchanged (S:U). The CVSS v3.1 base score is 8.1, reflecting high severity due to the impact on integrity and availability. Although no known exploits have been reported in the wild, the flaw poses a significant risk to organizations relying on Rallly for scheduling and collaboration. The issue was addressed in Rallly version 4.5.4 by implementing proper authorization checks to ensure only poll owners or authorized users can delete participants.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized manipulation of poll data, resulting in loss of trust in scheduling and collaboration processes. The integrity of poll participation is compromised, potentially causing confusion, missed meetings, or disrupted workflows. Availability is also affected as participants can be removed arbitrarily, potentially locking out legitimate users or poll owners. This can disrupt project management, team coordination, and decision-making processes. Organizations in sectors relying heavily on collaborative scheduling, such as IT, education, and public administration, may experience operational inefficiencies or reputational damage. Additionally, if Rallly is integrated with other internal systems, the impact could cascade, affecting broader organizational functions.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization flaw has been fixed. Organizations should audit existing poll data to detect unauthorized participant deletions and restore data integrity where possible. Implement strict access controls and monitor authenticated user actions related to poll management. Employ logging and alerting mechanisms to detect suspicious deletion activities. Consider restricting poll creation and management privileges to trusted users only. For organizations using customized or self-hosted versions, review and harden authorization logic around participant management endpoints. Regularly update and patch open-source tools to reduce exposure to known vulnerabilities. Finally, educate users about the importance of reporting unexpected poll changes promptly.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2025-65029: CWE-285: Improper Authorization in lukevella rallly
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to authorize deletions, enabling attackers to remove other users (including poll owners) from polls. This impacts the integrity and availability of poll participation data. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-65029 is an improper authorization vulnerability classified under CWE-285, CWE-639, and CWE-862, found in the open-source scheduling and collaboration tool Rallly, versions prior to 4.5.4. The vulnerability arises from an insecure direct object reference (IDOR) flaw in the poll participant deletion endpoint, which authorizes deletion requests solely based on the participant ID without verifying whether the requesting user owns the poll or has appropriate permissions. As a result, any authenticated user can delete arbitrary participants from any poll, including the poll owner, thereby compromising the integrity and availability of poll participation data. The vulnerability requires authentication but no additional user interaction, and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the scope remains unchanged (S:U). The CVSS v3.1 base score is 8.1, reflecting high severity due to the impact on integrity and availability. Although no known exploits have been reported in the wild, the flaw poses a significant risk to organizations relying on Rallly for scheduling and collaboration. The issue was addressed in Rallly version 4.5.4 by implementing proper authorization checks to ensure only poll owners or authorized users can delete participants.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized manipulation of poll data, resulting in loss of trust in scheduling and collaboration processes. The integrity of poll participation is compromised, potentially causing confusion, missed meetings, or disrupted workflows. Availability is also affected as participants can be removed arbitrarily, potentially locking out legitimate users or poll owners. This can disrupt project management, team coordination, and decision-making processes. Organizations in sectors relying heavily on collaborative scheduling, such as IT, education, and public administration, may experience operational inefficiencies or reputational damage. Additionally, if Rallly is integrated with other internal systems, the impact could cascade, affecting broader organizational functions.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization flaw has been fixed. Organizations should audit existing poll data to detect unauthorized participant deletions and restore data integrity where possible. Implement strict access controls and monitor authenticated user actions related to poll management. Employ logging and alerting mechanisms to detect suspicious deletion activities. Consider restricting poll creation and management privileges to trusted users only. For organizations using customized or self-hosted versions, review and harden authorization logic around participant management endpoints. Regularly update and patch open-source tools to reduce exposure to known vulnerabilities. Finally, educate users about the importance of reporting unexpected poll changes promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-13T15:36:51.682Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e026793c808727dc91d5c
Added to database: 11/19/2025, 5:46:15 PM
Last enriched: 11/19/2025, 6:01:54 PM
Last updated: 11/19/2025, 6:55:23 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63211: n/a
HighCVE-2025-65089: CWE-862: Missing Authorization in xwikisas xwiki-pro-macros
MediumCVE-2025-13315: CWE-420: Unprotected Alternate Channel in Lynxtechnology Twonky Server
CriticalCVE-2025-13316: CWE-321: Use of Hard-coded Cryptographic Key in Lynxtechnology Twonky Server
HighCVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.