CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
AI Analysis
Technical Summary
CVE-2025-65034 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Rallly scheduling and collaboration tool maintained by lukevella. The vulnerability exists in versions prior to 4.5.4 and allows any authenticated user to reopen finalized polls that belong to other users by manipulating the pollId parameter in API requests or the user interface. This improper authorization check fails to verify ownership or permission before allowing the reopening action. The consequence is that unauthorized users can alter the state of polls, disrupting event scheduling and collaboration workflows. This compromises the integrity of poll data and availability of finalized events, potentially causing confusion or operational delays. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. Although no exploits have been reported in the wild, the flaw is straightforward to exploit by any authenticated user, making it a significant risk for organizations using affected versions. The issue was addressed and patched in Rallly version 4.5.4 by implementing proper authorization checks to ensure only poll owners or authorized users can reopen finalized polls.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized manipulation of event scheduling data, causing disruption in collaborative workflows and event management. The integrity of poll results is compromised as unauthorized users can reopen and potentially alter finalized polls. This can result in operational inefficiencies, loss of trust among users, and potential cascading effects on dependent business processes or decision-making. Availability is also impacted since finalized events can be reopened and changed, leading to confusion and scheduling conflicts. Organizations relying on Rallly for critical scheduling, especially in sectors like education, public administration, or collaborative project management, may face significant operational disruptions. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Given the open-source nature of Rallly, organizations using customized or self-hosted deployments must ensure timely patching to avoid exploitation.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization bypass vulnerability has been fixed. Organizations should audit their current Rallly deployments to identify affected versions and prioritize patching accordingly. Implement strict access controls and monitor authenticated user activities related to poll management to detect unauthorized reopening of polls. Consider integrating additional logging and alerting mechanisms for poll state changes to quickly identify suspicious behavior. For self-hosted environments, review and harden API endpoint authorization logic to prevent manipulation of parameters like pollId by unauthorized users. Educate users and administrators about the risk of insider threats and the importance of safeguarding credentials. If immediate patching is not feasible, restrict Rallly access to trusted networks or VPNs to reduce exposure. Regularly review and update user permissions to ensure only authorized personnel can manage polls and events.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-65034: CWE-639: Authorization Bypass Through User-Controlled Key in lukevella rallly
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-65034 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Rallly scheduling and collaboration tool maintained by lukevella. The vulnerability exists in versions prior to 4.5.4 and allows any authenticated user to reopen finalized polls that belong to other users by manipulating the pollId parameter in API requests or the user interface. This improper authorization check fails to verify ownership or permission before allowing the reopening action. The consequence is that unauthorized users can alter the state of polls, disrupting event scheduling and collaboration workflows. This compromises the integrity of poll data and availability of finalized events, potentially causing confusion or operational delays. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. Although no exploits have been reported in the wild, the flaw is straightforward to exploit by any authenticated user, making it a significant risk for organizations using affected versions. The issue was addressed and patched in Rallly version 4.5.4 by implementing proper authorization checks to ensure only poll owners or authorized users can reopen finalized polls.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized manipulation of event scheduling data, causing disruption in collaborative workflows and event management. The integrity of poll results is compromised as unauthorized users can reopen and potentially alter finalized polls. This can result in operational inefficiencies, loss of trust among users, and potential cascading effects on dependent business processes or decision-making. Availability is also impacted since finalized events can be reopened and changed, leading to confusion and scheduling conflicts. Organizations relying on Rallly for critical scheduling, especially in sectors like education, public administration, or collaborative project management, may face significant operational disruptions. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Given the open-source nature of Rallly, organizations using customized or self-hosted deployments must ensure timely patching to avoid exploitation.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.4 or later, where the authorization bypass vulnerability has been fixed. Organizations should audit their current Rallly deployments to identify affected versions and prioritize patching accordingly. Implement strict access controls and monitor authenticated user activities related to poll management to detect unauthorized reopening of polls. Consider integrating additional logging and alerting mechanisms for poll state changes to quickly identify suspicious behavior. For self-hosted environments, review and harden API endpoint authorization logic to prevent manipulation of parameters like pollId by unauthorized users. Educate users and administrators about the risk of insider threats and the importance of safeguarding credentials. If immediate patching is not feasible, restrict Rallly access to trusted networks or VPNs to reduce exposure. Regularly review and update user permissions to ensure only authorized personnel can manage polls and events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-13T15:36:51.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e026793c808727dc91d70
Added to database: 11/19/2025, 5:46:15 PM
Last enriched: 11/19/2025, 6:01:04 PM
Last updated: 11/19/2025, 8:04:08 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63213: n/a
UnknownCVE-2025-63212: n/a
UnknownCVE-2025-65103: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2025-64759: CWE-20: Improper Input Validation in homarr-labs homarr
HighCVE-2025-65100: CWE-693: Protection Mechanism Failure in ilbers isar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.