CVE-2026-23478: CWE-602: Client-Side Enforcement of Server-Side Security in calcom cal.com
CVE-2026-23478 is a critical vulnerability in cal. com versions from 3. 1. 6 up to but not including 6. 0. 7. It arises from improper client-side enforcement of server-side security in a custom NextAuth JWT callback, allowing attackers to gain full authenticated access to any user account by supplying a target email address via session. update(). This vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 10.
AI Analysis
Technical Summary
CVE-2026-23478 is a critical security vulnerability identified in the open-source scheduling software cal.com, affecting versions from 3.1.6 up to but not including 6.0.7. The root cause lies in a custom NextAuth JWT callback implementation that improperly enforces security controls on the client side rather than the server side. Specifically, the session.update() function accepts a target email address parameter without adequate server-side validation, enabling an attacker to impersonate any user by supplying their email address. This bypasses authentication mechanisms, granting the attacker full authenticated access to the victim's account. The vulnerability is classified under CWE-602 (Client-Side Enforcement of Server-Side Security) and CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS 4.0 vector indicates the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The scope is high (S:H), meaning the vulnerability affects resources beyond the initially vulnerable component. Although no known exploits are reported in the wild yet, the critical severity and ease of exploitation make it a significant threat. The vulnerability is resolved in cal.com version 6.0.7 by enforcing proper server-side validation of session updates and restricting unauthorized email parameter manipulation.
Potential Impact
For European organizations, this vulnerability poses a severe risk as it allows attackers to fully compromise user accounts without authentication or user interaction. Organizations relying on cal.com for scheduling and calendar management could face unauthorized access to sensitive personal and business information, leading to data breaches, privacy violations, and potential disruption of business operations. Attackers could manipulate schedules, access confidential meeting details, or impersonate users to conduct further attacks such as social engineering or lateral movement within networks. The high severity and ease of exploitation increase the likelihood of targeted attacks, especially against sectors with high dependency on scheduling tools, such as healthcare, legal, finance, and government agencies. Additionally, compromised accounts could be leveraged to bypass other security controls or gain access to integrated third-party services. The reputational damage and regulatory consequences under GDPR for failing to protect personal data could be substantial.
Mitigation Recommendations
European organizations using cal.com versions between 3.1.6 and 6.0.7 should immediately upgrade to version 6.0.7 or later where the vulnerability is patched. Until patching is possible, organizations should implement strict access controls and monitor for unusual session update activities, particularly those involving email address changes. Employ network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect and block suspicious session.update() requests that attempt to manipulate email parameters. Conduct thorough audits of user session management and authentication flows to ensure no other client-side enforcement weaknesses exist. Educate development teams on the importance of server-side validation for all security-critical operations. Additionally, implement multi-factor authentication (MFA) to reduce the impact of compromised credentials. Regularly review logs for anomalous access patterns and consider isolating cal.com instances to minimize lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2026-23478: CWE-602: Client-Side Enforcement of Server-Side Security in calcom cal.com
Description
CVE-2026-23478 is a critical vulnerability in cal. com versions from 3. 1. 6 up to but not including 6. 0. 7. It arises from improper client-side enforcement of server-side security in a custom NextAuth JWT callback, allowing attackers to gain full authenticated access to any user account by supplying a target email address via session. update(). This vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 10.
AI-Powered Analysis
Technical Analysis
CVE-2026-23478 is a critical security vulnerability identified in the open-source scheduling software cal.com, affecting versions from 3.1.6 up to but not including 6.0.7. The root cause lies in a custom NextAuth JWT callback implementation that improperly enforces security controls on the client side rather than the server side. Specifically, the session.update() function accepts a target email address parameter without adequate server-side validation, enabling an attacker to impersonate any user by supplying their email address. This bypasses authentication mechanisms, granting the attacker full authenticated access to the victim's account. The vulnerability is classified under CWE-602 (Client-Side Enforcement of Server-Side Security) and CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS 4.0 vector indicates the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The scope is high (S:H), meaning the vulnerability affects resources beyond the initially vulnerable component. Although no known exploits are reported in the wild yet, the critical severity and ease of exploitation make it a significant threat. The vulnerability is resolved in cal.com version 6.0.7 by enforcing proper server-side validation of session updates and restricting unauthorized email parameter manipulation.
Potential Impact
For European organizations, this vulnerability poses a severe risk as it allows attackers to fully compromise user accounts without authentication or user interaction. Organizations relying on cal.com for scheduling and calendar management could face unauthorized access to sensitive personal and business information, leading to data breaches, privacy violations, and potential disruption of business operations. Attackers could manipulate schedules, access confidential meeting details, or impersonate users to conduct further attacks such as social engineering or lateral movement within networks. The high severity and ease of exploitation increase the likelihood of targeted attacks, especially against sectors with high dependency on scheduling tools, such as healthcare, legal, finance, and government agencies. Additionally, compromised accounts could be leveraged to bypass other security controls or gain access to integrated third-party services. The reputational damage and regulatory consequences under GDPR for failing to protect personal data could be substantial.
Mitigation Recommendations
European organizations using cal.com versions between 3.1.6 and 6.0.7 should immediately upgrade to version 6.0.7 or later where the vulnerability is patched. Until patching is possible, organizations should implement strict access controls and monitor for unusual session update activities, particularly those involving email address changes. Employ network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect and block suspicious session.update() requests that attempt to manipulate email parameters. Conduct thorough audits of user session management and authentication flows to ensure no other client-side enforcement weaknesses exist. Educate development teams on the importance of server-side validation for all security-critical operations. Additionally, implement multi-factor authentication (MFA) to reduce the impact of compromised credentials. Regularly review logs for anomalous access patterns and consider isolating cal.com instances to minimize lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T15:47:41.627Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6966bf90a60475309fb963d3
Added to database: 1/13/2026, 9:56:32 PM
Last enriched: 1/13/2026, 10:11:39 PM
Last updated: 1/13/2026, 10:59:03 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21301: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler
MediumCVE-2026-21299: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Modeler
HighCVE-2025-13447: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster
HighCVE-2025-13444: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) in Progress Software LoadMaster
HighCVE-2026-22861: CWE-252: Unchecked Return Value in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.