CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-65034 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Rallly, an open-source scheduling and collaboration platform. The flaw exists in versions prior to 4.5.4, where the application fails to properly verify user permissions when reopening finalized polls. Specifically, any authenticated user can manipulate the pollId parameter in requests to reopen polls that belong to other users without proper authorization checks. This bypass allows unauthorized reopening of finalized polls, which can disrupt scheduled events, cause confusion among participants, and compromise the integrity and availability of poll data. The vulnerability does not affect confidentiality directly but impacts integrity and availability significantly. Exploitation requires the attacker to be authenticated but does not require additional user interaction, making it relatively easy to exploit within an organization. The issue was identified and patched in version 4.5.4, which enforces proper authorization checks on poll reopening operations. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 score is 8.1, reflecting high severity due to network attack vector, low attack complexity, required privileges, and no user interaction. The vulnerability's root cause is insufficient authorization validation when processing user-controlled keys (pollId), a common security weakness in web applications managing multi-user resources.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of collaborative scheduling data. Organizations relying on Rallly for event coordination may experience unauthorized reopening of finalized polls, leading to event disruptions, scheduling conflicts, and potential loss of trust among users. This can affect internal operations, customer-facing scheduling, and cross-organizational collaboration. The disruption could cascade into operational inefficiencies and reputational damage, especially for sectors dependent on precise scheduling such as healthcare, education, and public services. Since the vulnerability requires authentication, insider threats or compromised user accounts could be leveraged to exploit this flaw. The lack of confidentiality impact reduces risk of data leakage but does not diminish the operational impact. Given the open-source nature of Rallly, organizations using customized or self-hosted deployments may face challenges in timely patching, increasing exposure duration.
Mitigation Recommendations
European organizations should immediately upgrade all Rallly instances to version 4.5.4 or later where the vulnerability is patched. In addition, organizations should audit user permissions and access controls related to poll management to ensure least privilege principles are enforced. Implement monitoring and alerting for unusual poll reopening activities, especially those initiated by users who do not own the polls. Consider network segmentation and access restrictions to limit authenticated user capabilities where possible. For self-hosted deployments, verify that all dependencies and integrations are compatible with the patched version to avoid operational disruptions. Conduct security awareness training to reduce risks from compromised credentials. Finally, maintain an incident response plan to quickly address any exploitation attempts or operational impacts stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-65034 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Rallly, an open-source scheduling and collaboration platform. The flaw exists in versions prior to 4.5.4, where the application fails to properly verify user permissions when reopening finalized polls. Specifically, any authenticated user can manipulate the pollId parameter in requests to reopen polls that belong to other users without proper authorization checks. This bypass allows unauthorized reopening of finalized polls, which can disrupt scheduled events, cause confusion among participants, and compromise the integrity and availability of poll data. The vulnerability does not affect confidentiality directly but impacts integrity and availability significantly. Exploitation requires the attacker to be authenticated but does not require additional user interaction, making it relatively easy to exploit within an organization. The issue was identified and patched in version 4.5.4, which enforces proper authorization checks on poll reopening operations. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 score is 8.1, reflecting high severity due to network attack vector, low attack complexity, required privileges, and no user interaction. The vulnerability's root cause is insufficient authorization validation when processing user-controlled keys (pollId), a common security weakness in web applications managing multi-user resources.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of collaborative scheduling data. Organizations relying on Rallly for event coordination may experience unauthorized reopening of finalized polls, leading to event disruptions, scheduling conflicts, and potential loss of trust among users. This can affect internal operations, customer-facing scheduling, and cross-organizational collaboration. The disruption could cascade into operational inefficiencies and reputational damage, especially for sectors dependent on precise scheduling such as healthcare, education, and public services. Since the vulnerability requires authentication, insider threats or compromised user accounts could be leveraged to exploit this flaw. The lack of confidentiality impact reduces risk of data leakage but does not diminish the operational impact. Given the open-source nature of Rallly, organizations using customized or self-hosted deployments may face challenges in timely patching, increasing exposure duration.
Mitigation Recommendations
European organizations should immediately upgrade all Rallly instances to version 4.5.4 or later where the vulnerability is patched. In addition, organizations should audit user permissions and access controls related to poll management to ensure least privilege principles are enforced. Implement monitoring and alerting for unusual poll reopening activities, especially those initiated by users who do not own the polls. Consider network segmentation and access restrictions to limit authenticated user capabilities where possible. For self-hosted deployments, verify that all dependencies and integrations are compatible with the patched version to avoid operational disruptions. Conduct security awareness training to reduce risks from compromised credentials. Finally, maintain an incident response plan to quickly address any exploitation attempts or operational impacts stemming from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-13T15:36:51.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e026793c808727dc91d70
Added to database: 11/19/2025, 5:46:15 PM
Last enriched: 11/26/2025, 6:05:31 PM
Last updated: 1/7/2026, 8:15:45 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-31964: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HCLSoftware BigFix IVR
LowCVE-2025-14802: CWE-639 Authorization Bypass Through User-Controlled Key in thimpress LearnPress – WordPress LMS Plugin
MediumCVE-2025-14792: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in audrasjb Key Figures
MediumCVE-2025-13369: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in premmerce Premmerce WooCommerce Customers Manager
MediumCVE-2025-12449: CWE-862 Missing Authorization in kodezen aBlocks – WordPress Gutenberg Blocks, User Dashboard Builder, Popup Builder, Form Builder & GSAP Animation Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.