Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66027: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in lukevella rallly

0
High
VulnerabilityCVE-2025-66027cvecve-2025-66027cwe-200cwe-284cwe-359
Published: Sat Nov 29 2025 (11/29/2025, 00:43:02 UTC)
Source: CVE Database V5
Vendor/Project: lukevella
Product: rallly

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:33:25 UTC

Technical Analysis

CVE-2025-66027 is an information disclosure vulnerability identified in the open-source scheduling and collaboration tool Rallly, versions prior to 4.5.6. The flaw resides in the API endpoints /api/trpc/polls.get and polls.participants.list, which improperly expose participant details including names and email addresses. This occurs even when Rallly’s Pro privacy features are enabled, effectively bypassing intended privacy controls designed to restrict access to personal information. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information), CWE-284 (Improper Access Control), and CWE-359 (Exposure of Private Information Through Persistent URL). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - limited privileges), no user interaction (UI:N), and high confidentiality impact (VC:H), with no impact on integrity or availability. This means an attacker with limited privileges can remotely exploit the vulnerability without user interaction to access sensitive participant data. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to user privacy and data protection compliance. The issue was reserved on 2025-11-21 and published on 2025-11-29, with a patch released in version 4.5.6 to remediate the flaw by enforcing proper access controls and privacy enforcement on the affected API endpoints.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of personal data, including participant names and email addresses. Such exposure can lead to privacy violations, reputational damage, and potential regulatory penalties under GDPR, which mandates strict protection of personal information. Organizations using Rallly for scheduling and collaboration may inadvertently leak sensitive user data to unauthorized parties, undermining trust and potentially facilitating phishing or social engineering attacks. The impact is particularly critical for sectors handling sensitive or regulated data, such as healthcare, finance, and government agencies. Additionally, the breach of privacy controls could lead to non-compliance with European data protection laws, resulting in fines and legal consequences. Since the vulnerability requires only limited privileges and no user interaction, it can be exploited relatively easily by insiders or attackers who gain minimal access, increasing the threat surface.

Mitigation Recommendations

The primary mitigation is to upgrade all Rallly instances to version 4.5.6 or later, where the vulnerability is patched. Organizations should immediately audit their deployments to identify affected versions and apply updates without delay. Additionally, review and tighten access control policies to ensure that only authorized users have access to participant data. Implement network segmentation and monitoring to detect unusual API access patterns. Consider disabling or restricting API endpoints that expose participant information if not essential. Conduct privacy impact assessments to evaluate exposure risks and ensure compliance with GDPR. Educate users and administrators about the risks of information disclosure and enforce strong authentication and authorization mechanisms. Finally, maintain an incident response plan to address potential data leaks promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a4ade2a13ea799f617d4a

Added to database: 11/29/2025, 1:22:38 AM

Last enriched: 12/6/2025, 4:33:25 AM

Last updated: 1/14/2026, 1:34:45 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats