Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65033: CWE-285: Improper Authorization in lukevella rallly

0
High
VulnerabilityCVE-2025-65033cvecve-2025-65033cwe-285cwe-639
Published: Wed Nov 19 2025 (11/19/2025, 17:26:44 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:05:52 UTC

Technical Analysis

CVE-2025-65033 is an authorization vulnerability classified under CWE-285 (Improper Authorization) and CWE-639 (Authorization Bypass Through User-Controlled Key). It affects Rallly, an open-source scheduling and collaboration platform, in all versions prior to 4.5.4. The vulnerability arises because the poll management feature relies solely on a public pollId to identify polls without verifying whether the authenticated user performing actions like pausing or resuming a poll is the poll owner. This lack of ownership verification allows any authenticated user to manipulate polls created by others, undermining the integrity and availability of poll data. The vulnerability does not disclose confidential information but enables unauthorized modification of poll states, which can disrupt collaborative workflows and scheduling activities. The CVSS v3.1 score is 8.1 (high), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and high availability impact (A:H). No known exploits are currently reported in the wild. The issue was publicly disclosed on November 19, 2025, and fixed in Rallly version 4.5.4. Organizations using vulnerable versions should prioritize patching to restore proper authorization controls and prevent unauthorized poll manipulation.

Potential Impact

For European organizations, this vulnerability can lead to significant disruption in collaborative scheduling and decision-making processes, particularly in environments relying on Rallly for team coordination. The unauthorized ability to pause or resume polls can cause confusion, delay decisions, and reduce trust in the scheduling platform’s reliability. While no direct data confidentiality breach occurs, the integrity and availability of poll data are compromised, potentially impacting business operations and productivity. Organizations with distributed teams or those heavily dependent on open-source collaboration tools may experience amplified operational impacts. Additionally, the ease of exploitation by any authenticated user increases the risk of insider threats or compromised accounts being leveraged to disrupt workflows. This could be particularly problematic in sectors such as government, education, and technology, where collaborative scheduling is critical.

Mitigation Recommendations

The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization flaw has been corrected. Organizations should audit current deployments to identify any running vulnerable versions. Additionally, implement strict access controls and monitoring for authenticated users to detect unusual poll management activities. Consider integrating multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Review and enforce role-based access controls (RBAC) within Rallly or the surrounding infrastructure to limit poll management capabilities to authorized personnel only. Regularly monitor logs for unauthorized poll state changes and establish incident response procedures to quickly address detected misuse. Finally, educate users about the importance of safeguarding credentials to prevent exploitation by unauthorized parties.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e026793c808727dc91d6c

Added to database: 11/19/2025, 5:46:15 PM

Last enriched: 11/26/2025, 6:05:52 PM

Last updated: 1/7/2026, 8:54:58 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats