CVE-2025-66489: CWE-303: Incorrect Implementation of Authentication Algorithm in calcom cal.com
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
AI Analysis
Technical Summary
CVE-2025-66489 is a critical vulnerability identified in the open-source scheduling software cal.com, affecting all versions prior to 5.9.8. The root cause is an incorrect implementation of the authentication algorithm (CWE-303), specifically in the login credentials provider component. The flaw involves problematic conditional logic that improperly handles the verification of passwords when a Time-based One-Time Password (TOTP) code is presented during login. Instead of requiring both a valid password and TOTP code for multi-factor authentication, the system erroneously allows authentication to succeed if a valid TOTP code is provided, bypassing the password check entirely. This logic error effectively reduces the authentication process to single-factor TOTP validation, which can be exploited by attackers who can generate or intercept valid TOTP codes, or in some cases, by exploiting weaknesses in TOTP generation or delivery mechanisms. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The impact is severe, as unauthorized access to user accounts can lead to data breaches, unauthorized actions, and potential compromise of linked systems. The vulnerability has been assigned a CVSS 4.0 base score of 9.9, reflecting its critical nature with high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on December 3, 2025, and fixed in cal.com version 5.9.8. No known exploits have been reported in the wild yet, but the criticality and ease of exploitation necessitate immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those using cal.com as part of their scheduling, appointment management, or user authentication workflows. Unauthorized access to user accounts can lead to exposure of sensitive personal and business information, disruption of services, and potential lateral movement within corporate networks. Organizations in sectors such as healthcare, finance, education, and government, which often rely on scheduling software integrated with sensitive data, are particularly vulnerable. The breach of user accounts could facilitate further attacks, including data exfiltration, fraud, and identity theft. Additionally, the trust in multi-factor authentication mechanisms may be undermined, complicating security postures. The critical severity and network exploitability mean attackers can operate remotely without prior access or user interaction, increasing the threat surface. Failure to patch promptly could result in widespread compromise, especially in environments where cal.com is widely deployed or integrated with other critical systems.
Mitigation Recommendations
Immediate upgrade to cal.com version 5.9.8 or later is the primary and most effective mitigation to address this vulnerability. Organizations should audit their current cal.com deployments to identify affected versions and prioritize patching. In environments where immediate patching is not feasible, temporary mitigations include disabling TOTP-based authentication or enforcing additional authentication checks outside of cal.com, such as integrating external identity providers with robust multi-factor authentication. Monitoring authentication logs for unusual login patterns, especially successful logins with TOTP but failed password attempts, can help detect exploitation attempts. Implement network segmentation and access controls to limit the impact of compromised accounts. Educate users about the importance of securing their TOTP devices and credentials. Finally, conduct regular security assessments and penetration testing to verify the effectiveness of mitigations and detect any residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-66489: CWE-303: Incorrect Implementation of Authentication Algorithm in calcom cal.com
Description
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-66489 is a critical vulnerability identified in the open-source scheduling software cal.com, affecting all versions prior to 5.9.8. The root cause is an incorrect implementation of the authentication algorithm (CWE-303), specifically in the login credentials provider component. The flaw involves problematic conditional logic that improperly handles the verification of passwords when a Time-based One-Time Password (TOTP) code is presented during login. Instead of requiring both a valid password and TOTP code for multi-factor authentication, the system erroneously allows authentication to succeed if a valid TOTP code is provided, bypassing the password check entirely. This logic error effectively reduces the authentication process to single-factor TOTP validation, which can be exploited by attackers who can generate or intercept valid TOTP codes, or in some cases, by exploiting weaknesses in TOTP generation or delivery mechanisms. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The impact is severe, as unauthorized access to user accounts can lead to data breaches, unauthorized actions, and potential compromise of linked systems. The vulnerability has been assigned a CVSS 4.0 base score of 9.9, reflecting its critical nature with high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on December 3, 2025, and fixed in cal.com version 5.9.8. No known exploits have been reported in the wild yet, but the criticality and ease of exploitation necessitate immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those using cal.com as part of their scheduling, appointment management, or user authentication workflows. Unauthorized access to user accounts can lead to exposure of sensitive personal and business information, disruption of services, and potential lateral movement within corporate networks. Organizations in sectors such as healthcare, finance, education, and government, which often rely on scheduling software integrated with sensitive data, are particularly vulnerable. The breach of user accounts could facilitate further attacks, including data exfiltration, fraud, and identity theft. Additionally, the trust in multi-factor authentication mechanisms may be undermined, complicating security postures. The critical severity and network exploitability mean attackers can operate remotely without prior access or user interaction, increasing the threat surface. Failure to patch promptly could result in widespread compromise, especially in environments where cal.com is widely deployed or integrated with other critical systems.
Mitigation Recommendations
Immediate upgrade to cal.com version 5.9.8 or later is the primary and most effective mitigation to address this vulnerability. Organizations should audit their current cal.com deployments to identify affected versions and prioritize patching. In environments where immediate patching is not feasible, temporary mitigations include disabling TOTP-based authentication or enforcing additional authentication checks outside of cal.com, such as integrating external identity providers with robust multi-factor authentication. Monitoring authentication logs for unusual login patterns, especially successful logins with TOTP but failed password attempts, can help detect exploitation attempts. Implement network segmentation and access controls to limit the impact of compromised accounts. Educate users about the importance of securing their TOTP devices and credentials. Finally, conduct regular security assessments and penetration testing to verify the effectiveness of mitigations and detect any residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-02T22:44:04.707Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693096f5728fb3f62eb70505
Added to database: 12/3/2025, 8:00:53 PM
Last enriched: 12/3/2025, 8:14:40 PM
Last updated: 12/4/2025, 3:04:47 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.