Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66489: CWE-303: Incorrect Implementation of Authentication Algorithm in calcom cal.com

0
Critical
VulnerabilityCVE-2025-66489cvecve-2025-66489cwe-303
Published: Wed Dec 03 2025 (12/03/2025, 19:44:35 UTC)
Source: CVE Database V5
Vendor/Project: calcom
Product: cal.com

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

AI-Powered Analysis

AILast updated: 12/03/2025, 20:14:40 UTC

Technical Analysis

CVE-2025-66489 is a critical vulnerability identified in the open-source scheduling software cal.com, affecting all versions prior to 5.9.8. The root cause is an incorrect implementation of the authentication algorithm (CWE-303), specifically in the login credentials provider component. The flaw involves problematic conditional logic that improperly handles the verification of passwords when a Time-based One-Time Password (TOTP) code is presented during login. Instead of requiring both a valid password and TOTP code for multi-factor authentication, the system erroneously allows authentication to succeed if a valid TOTP code is provided, bypassing the password check entirely. This logic error effectively reduces the authentication process to single-factor TOTP validation, which can be exploited by attackers who can generate or intercept valid TOTP codes, or in some cases, by exploiting weaknesses in TOTP generation or delivery mechanisms. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The impact is severe, as unauthorized access to user accounts can lead to data breaches, unauthorized actions, and potential compromise of linked systems. The vulnerability has been assigned a CVSS 4.0 base score of 9.9, reflecting its critical nature with high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on December 3, 2025, and fixed in cal.com version 5.9.8. No known exploits have been reported in the wild yet, but the criticality and ease of exploitation necessitate immediate remediation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using cal.com as part of their scheduling, appointment management, or user authentication workflows. Unauthorized access to user accounts can lead to exposure of sensitive personal and business information, disruption of services, and potential lateral movement within corporate networks. Organizations in sectors such as healthcare, finance, education, and government, which often rely on scheduling software integrated with sensitive data, are particularly vulnerable. The breach of user accounts could facilitate further attacks, including data exfiltration, fraud, and identity theft. Additionally, the trust in multi-factor authentication mechanisms may be undermined, complicating security postures. The critical severity and network exploitability mean attackers can operate remotely without prior access or user interaction, increasing the threat surface. Failure to patch promptly could result in widespread compromise, especially in environments where cal.com is widely deployed or integrated with other critical systems.

Mitigation Recommendations

Immediate upgrade to cal.com version 5.9.8 or later is the primary and most effective mitigation to address this vulnerability. Organizations should audit their current cal.com deployments to identify affected versions and prioritize patching. In environments where immediate patching is not feasible, temporary mitigations include disabling TOTP-based authentication or enforcing additional authentication checks outside of cal.com, such as integrating external identity providers with robust multi-factor authentication. Monitoring authentication logs for unusual login patterns, especially successful logins with TOTP but failed password attempts, can help detect exploitation attempts. Implement network segmentation and access controls to limit the impact of compromised accounts. Educate users about the importance of securing their TOTP devices and credentials. Finally, conduct regular security assessments and penetration testing to verify the effectiveness of mitigations and detect any residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T22:44:04.707Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693096f5728fb3f62eb70505

Added to database: 12/3/2025, 8:00:53 PM

Last enriched: 12/3/2025, 8:14:40 PM

Last updated: 12/4/2025, 3:04:47 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats