CVE-2025-65033: CWE-285: Improper Authorization in lukevella rallly
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-65033 is an authorization vulnerability classified under CWE-285 (Improper Authorization) and CWE-639 (Authorization Bypass Through User-Controlled Key). It affects Rallly, an open-source scheduling and collaboration platform, in all versions prior to 4.5.4. The vulnerability arises because the poll management feature relies solely on a public pollId to identify polls without verifying whether the authenticated user performing actions like pausing or resuming a poll is the poll owner. This lack of ownership verification allows any authenticated user to manipulate polls created by others, undermining the integrity and availability of poll data. The vulnerability does not disclose confidential information but enables unauthorized modification of poll states, which can disrupt collaborative workflows and scheduling activities. The CVSS v3.1 score is 8.1 (high), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and high availability impact (A:H). No known exploits are currently reported in the wild. The issue was publicly disclosed on November 19, 2025, and fixed in Rallly version 4.5.4. Organizations using vulnerable versions should prioritize patching to restore proper authorization controls and prevent unauthorized poll manipulation.
Potential Impact
For European organizations, this vulnerability can lead to significant disruption in collaborative scheduling and decision-making processes, particularly in environments relying on Rallly for team coordination. The unauthorized ability to pause or resume polls can cause confusion, delay decisions, and reduce trust in the scheduling platform’s reliability. While no direct data confidentiality breach occurs, the integrity and availability of poll data are compromised, potentially impacting business operations and productivity. Organizations with distributed teams or those heavily dependent on open-source collaboration tools may experience amplified operational impacts. Additionally, the ease of exploitation by any authenticated user increases the risk of insider threats or compromised accounts being leveraged to disrupt workflows. This could be particularly problematic in sectors such as government, education, and technology, where collaborative scheduling is critical.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization flaw has been corrected. Organizations should audit current deployments to identify any running vulnerable versions. Additionally, implement strict access controls and monitoring for authenticated users to detect unusual poll management activities. Consider integrating multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Review and enforce role-based access controls (RBAC) within Rallly or the surrounding infrastructure to limit poll management capabilities to authorized personnel only. Regularly monitor logs for unauthorized poll state changes and establish incident response procedures to quickly address detected misuse. Finally, educate users about the importance of safeguarding credentials to prevent exploitation by unauthorized parties.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden
CVE-2025-65033: CWE-285: Improper Authorization in lukevella rallly
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-65033 is an authorization vulnerability classified under CWE-285 (Improper Authorization) and CWE-639 (Authorization Bypass Through User-Controlled Key). It affects Rallly, an open-source scheduling and collaboration platform, in all versions prior to 4.5.4. The vulnerability arises because the poll management feature relies solely on a public pollId to identify polls without verifying whether the authenticated user performing actions like pausing or resuming a poll is the poll owner. This lack of ownership verification allows any authenticated user to manipulate polls created by others, undermining the integrity and availability of poll data. The vulnerability does not disclose confidential information but enables unauthorized modification of poll states, which can disrupt collaborative workflows and scheduling activities. The CVSS v3.1 score is 8.1 (high), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and high availability impact (A:H). No known exploits are currently reported in the wild. The issue was publicly disclosed on November 19, 2025, and fixed in Rallly version 4.5.4. Organizations using vulnerable versions should prioritize patching to restore proper authorization controls and prevent unauthorized poll manipulation.
Potential Impact
For European organizations, this vulnerability can lead to significant disruption in collaborative scheduling and decision-making processes, particularly in environments relying on Rallly for team coordination. The unauthorized ability to pause or resume polls can cause confusion, delay decisions, and reduce trust in the scheduling platform’s reliability. While no direct data confidentiality breach occurs, the integrity and availability of poll data are compromised, potentially impacting business operations and productivity. Organizations with distributed teams or those heavily dependent on open-source collaboration tools may experience amplified operational impacts. Additionally, the ease of exploitation by any authenticated user increases the risk of insider threats or compromised accounts being leveraged to disrupt workflows. This could be particularly problematic in sectors such as government, education, and technology, where collaborative scheduling is critical.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization flaw has been corrected. Organizations should audit current deployments to identify any running vulnerable versions. Additionally, implement strict access controls and monitoring for authenticated users to detect unusual poll management activities. Consider integrating multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Review and enforce role-based access controls (RBAC) within Rallly or the surrounding infrastructure to limit poll management capabilities to authorized personnel only. Regularly monitor logs for unauthorized poll state changes and establish incident response procedures to quickly address detected misuse. Finally, educate users about the importance of safeguarding credentials to prevent exploitation by unauthorized parties.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-13T15:36:51.683Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e026793c808727dc91d6c
Added to database: 11/19/2025, 5:46:15 PM
Last enriched: 11/26/2025, 6:05:52 PM
Last updated: 1/7/2026, 8:54:58 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.