Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66489: CWE-303: Incorrect Implementation of Authentication Algorithm in calcom cal.com

0
Critical
VulnerabilityCVE-2025-66489cvecve-2025-66489cwe-303
Published: Wed Dec 03 2025 (12/03/2025, 19:44:35 UTC)
Source: CVE Database V5
Vendor/Project: calcom
Product: cal.com

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

AI-Powered Analysis

AILast updated: 12/10/2025, 20:51:00 UTC

Technical Analysis

CVE-2025-66489 is a critical vulnerability affecting cal.com, an open-source scheduling software widely used for managing appointments and user authentication. The flaw is rooted in CWE-303, which pertains to incorrect implementation of authentication algorithms. Specifically, in versions prior to 5.9.8, the login credentials provider contains problematic conditional logic that allows an attacker to bypass password verification if they provide a valid Time-based One-Time Password (TOTP) code. This means that the system incorrectly trusts the TOTP code alone without verifying the associated password, effectively allowing unauthorized users to gain access to accounts by supplying only the TOTP. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 9.9 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability of user accounts and potentially the broader system. Although no public exploits have been reported yet, the vulnerability's nature suggests that exploitation could lead to full account compromise, unauthorized data access, and potential lateral movement within affected environments. The issue was addressed and fixed in cal.com version 5.9.8 by correcting the authentication logic to ensure both password and TOTP verification are properly enforced. Organizations using cal.com versions earlier than 5.9.8 should prioritize upgrading to mitigate this risk.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the security of user accounts and sensitive scheduling data. Unauthorized access could lead to data breaches, manipulation of appointments, exposure of personal information, and potential disruption of business operations. Organizations that integrate cal.com into their digital workflows, especially those handling sensitive client or employee data, face risks to confidentiality and integrity. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, potentially enabling threat actors to impersonate legitimate users or escalate privileges. This could also facilitate further attacks within the network, including data exfiltration or ransomware deployment. The impact is particularly critical for sectors such as healthcare, finance, and government services in Europe, where scheduling systems often handle sensitive or regulated information. Additionally, reputational damage and regulatory penalties under GDPR could result from exploitation of this vulnerability.

Mitigation Recommendations

Immediate patching to cal.com version 5.9.8 or later is the primary and most effective mitigation step. Organizations should audit their current cal.com deployments to identify affected versions and prioritize upgrades. Beyond patching, reviewing and strengthening authentication mechanisms is advised, including enforcing multi-factor authentication policies that do not rely solely on TOTP codes without password verification. Monitoring authentication logs for unusual patterns, such as successful logins with atypical credential combinations, can help detect exploitation attempts. Implementing network segmentation and limiting access to scheduling systems can reduce exposure. Additionally, organizations should educate users about potential phishing attempts that might leverage this vulnerability and ensure incident response plans are updated to address potential account compromises. For environments where immediate patching is not feasible, temporary mitigations could include disabling TOTP-based logins or restricting access to trusted IP ranges until the patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T22:44:04.707Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693096f5728fb3f62eb70505

Added to database: 12/3/2025, 8:00:53 PM

Last enriched: 12/10/2025, 8:51:00 PM

Last updated: 1/18/2026, 5:47:55 AM

Views: 287

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats