CVE-2025-66027: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in lukevella rallly
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
AI Analysis
Technical Summary
CVE-2025-66027 is an information disclosure vulnerability identified in the open-source scheduling and collaboration tool Rallly, versions prior to 4.5.6. The flaw resides in the API endpoints /api/trpc/polls.get and polls.participants.list, which improperly expose participant details including names and email addresses. This occurs even when Rallly’s Pro privacy features are enabled, effectively bypassing intended privacy controls designed to restrict access to personal information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information), CWE-284 (Improper Access Control), and CWE-359 (Exposure of Private Information Through Persistent URL). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - limited privileges), no user interaction (UI:N), and high confidentiality impact (VC:H), with no impact on integrity or availability. This means an attacker with limited privileges can remotely exploit the vulnerability without user interaction to access sensitive participant data. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to user privacy and data protection compliance. The issue was reserved on 2025-11-21 and published on 2025-11-29, with a patch released in version 4.5.6 to remediate the flaw by enforcing proper access controls and privacy enforcement on the affected API endpoints.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of personal data, including participant names and email addresses. Such exposure can lead to privacy violations, reputational damage, and potential regulatory penalties under GDPR, which mandates strict protection of personal information. Organizations using Rallly for scheduling and collaboration may inadvertently leak sensitive user data to unauthorized parties, undermining trust and potentially facilitating phishing or social engineering attacks. The impact is particularly critical for sectors handling sensitive or regulated data, such as healthcare, finance, and government agencies. Additionally, the breach of privacy controls could lead to non-compliance with European data protection laws, resulting in fines and legal consequences. Since the vulnerability requires only limited privileges and no user interaction, it can be exploited relatively easily by insiders or attackers who gain minimal access, increasing the threat surface.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.6 or later, where the vulnerability is patched. Organizations should immediately audit their deployments to identify affected versions and apply updates without delay. Additionally, review and tighten access control policies to ensure that only authorized users have access to participant data. Implement network segmentation and monitoring to detect unusual API access patterns. Consider disabling or restricting API endpoints that expose participant information if not essential. Conduct privacy impact assessments to evaluate exposure risks and ensure compliance with GDPR. Educate users and administrators about the risks of information disclosure and enforce strong authentication and authorization mechanisms. Finally, maintain an incident response plan to address potential data leaks promptly.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Belgium
CVE-2025-66027: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in lukevella rallly
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-66027 is an information disclosure vulnerability identified in the open-source scheduling and collaboration tool Rallly, versions prior to 4.5.6. The flaw resides in the API endpoints /api/trpc/polls.get and polls.participants.list, which improperly expose participant details including names and email addresses. This occurs even when Rallly’s Pro privacy features are enabled, effectively bypassing intended privacy controls designed to restrict access to personal information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information), CWE-284 (Improper Access Control), and CWE-359 (Exposure of Private Information Through Persistent URL). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - limited privileges), no user interaction (UI:N), and high confidentiality impact (VC:H), with no impact on integrity or availability. This means an attacker with limited privileges can remotely exploit the vulnerability without user interaction to access sensitive participant data. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to user privacy and data protection compliance. The issue was reserved on 2025-11-21 and published on 2025-11-29, with a patch released in version 4.5.6 to remediate the flaw by enforcing proper access controls and privacy enforcement on the affected API endpoints.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of personal data, including participant names and email addresses. Such exposure can lead to privacy violations, reputational damage, and potential regulatory penalties under GDPR, which mandates strict protection of personal information. Organizations using Rallly for scheduling and collaboration may inadvertently leak sensitive user data to unauthorized parties, undermining trust and potentially facilitating phishing or social engineering attacks. The impact is particularly critical for sectors handling sensitive or regulated data, such as healthcare, finance, and government agencies. Additionally, the breach of privacy controls could lead to non-compliance with European data protection laws, resulting in fines and legal consequences. Since the vulnerability requires only limited privileges and no user interaction, it can be exploited relatively easily by insiders or attackers who gain minimal access, increasing the threat surface.
Mitigation Recommendations
The primary mitigation is to upgrade all Rallly instances to version 4.5.6 or later, where the vulnerability is patched. Organizations should immediately audit their deployments to identify affected versions and apply updates without delay. Additionally, review and tighten access control policies to ensure that only authorized users have access to participant data. Implement network segmentation and monitoring to detect unusual API access patterns. Consider disabling or restricting API endpoints that expose participant information if not essential. Conduct privacy impact assessments to evaluate exposure risks and ensure compliance with GDPR. Educate users and administrators about the risks of information disclosure and enforce strong authentication and authorization mechanisms. Finally, maintain an incident response plan to address potential data leaks promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-21T01:08:02.614Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692a4ade2a13ea799f617d4a
Added to database: 11/29/2025, 1:22:38 AM
Last enriched: 12/6/2025, 4:33:25 AM
Last updated: 1/14/2026, 1:34:45 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12050: CWE-787 Out-of-bounds Write in Insyde Software InsydeH2O tools
HighCVE-2026-21306: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Sampler
HighCVE-2026-21303: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Modeler
MediumCVE-2026-21302: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Modeler
MediumCVE-2026-21300: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.