Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly

0
High
VulnerabilityCVE-2025-65034cvecve-2025-65034cwe-639
Published: Wed Nov 19 2025 (11/19/2025, 17:26:59 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.

AI-Powered Analysis

AILast updated: 11/19/2025, 18:01:04 UTC

Technical Analysis

CVE-2025-65034 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Rallly scheduling and collaboration tool maintained by lukevella. The vulnerability exists in versions prior to 4.5.4 and allows any authenticated user to reopen finalized polls that belong to other users by manipulating the pollId parameter in API requests or the user interface. This improper authorization check fails to verify ownership or permission before allowing the reopening action. The consequence is that unauthorized users can alter the state of polls, disrupting event scheduling and collaboration workflows. This compromises the integrity of poll data and availability of finalized events, potentially causing confusion or operational delays. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. Although no exploits have been reported in the wild, the flaw is straightforward to exploit by any authenticated user, making it a significant risk for organizations using affected versions. The issue was addressed and patched in Rallly version 4.5.4 by implementing proper authorization checks to ensure only poll owners or authorized users can reopen finalized polls.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized manipulation of event scheduling data, causing disruption in collaborative workflows and event management. The integrity of poll results is compromised as unauthorized users can reopen and potentially alter finalized polls. This can result in operational inefficiencies, loss of trust among users, and potential cascading effects on dependent business processes or decision-making. Availability is also impacted since finalized events can be reopened and changed, leading to confusion and scheduling conflicts. Organizations relying on Rallly for critical scheduling, especially in sectors like education, public administration, or collaborative project management, may face significant operational disruptions. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Given the open-source nature of Rallly, organizations using customized or self-hosted deployments must ensure timely patching to avoid exploitation.

Mitigation Recommendations

The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization bypass vulnerability has been fixed. Organizations should audit their current Rallly deployments to identify affected versions and prioritize patching accordingly. Implement strict access controls and monitor authenticated user activities related to poll management to detect unauthorized reopening of polls. Consider integrating additional logging and alerting mechanisms for poll state changes to quickly identify suspicious behavior. For self-hosted environments, review and harden API endpoint authorization logic to prevent manipulation of parameters like pollId by unauthorized users. Educate users and administrators about the risk of insider threats and the importance of safeguarding credentials. If immediate patching is not feasible, restrict Rallly access to trusted networks or VPNs to reduce exposure. Regularly review and update user permissions to ensure only authorized personnel can manage polls and events.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-13T15:36:51.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e026793c808727dc91d70

Added to database: 11/19/2025, 5:46:15 PM

Last enriched: 11/19/2025, 6:01:04 PM

Last updated: 11/19/2025, 8:04:08 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats