Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23478: CWE-602: Client-Side Enforcement of Server-Side Security in calcom cal.com

0
Critical
VulnerabilityCVE-2026-23478cvecve-2026-23478cwe-602cwe-639
Published: Tue Jan 13 2026 (01/13/2026, 21:37:35 UTC)
Source: CVE Database V5
Vendor/Project: calcom
Product: cal.com

Description

CVE-2026-23478 is a critical vulnerability in cal. com versions from 3. 1. 6 up to before 6. 0. 7, where a flaw in a custom NextAuth JWT callback allows attackers to gain full authenticated access to any user's account by supplying a target email address via session. update(). This vulnerability arises from client-side enforcement of server-side security controls, violating proper authorization checks. It has a CVSS 4. 0 score of 10.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:32:45 UTC

Technical Analysis

CVE-2026-23478 affects cal.com, an open-source scheduling platform widely used for appointment management. The vulnerability stems from improper authorization enforcement in a custom NextAuth JWT callback mechanism. Specifically, versions from 3.1.6 to before 6.0.7 allow an attacker to manipulate the session.update() function by supplying an arbitrary target email address, thereby bypassing server-side authorization checks and gaining full authenticated access to any user's account without needing credentials or user interaction. This is a classic example of CWE-602 (Client-Side Enforcement of Server-Side Security) combined with CWE-639 (Authorization Bypass Through User-Controlled Key). The flaw enables attackers to impersonate users, access sensitive scheduling data, modify appointments, and potentially escalate privileges within the application. The vulnerability has a CVSS 4.0 score of 10.0, reflecting its critical impact on confidentiality, integrity, and availability, with an attack vector that is network-based, requires no privileges or user interaction, and affects all instances running vulnerable versions. Although no known exploits are currently reported in the wild, the ease of exploitation and severity necessitate urgent remediation. The issue is resolved in cal.com version 6.0.7 by enforcing proper server-side authorization checks and eliminating reliance on client-side validation for session updates.

Potential Impact

For European organizations, this vulnerability poses a severe risk as it allows attackers to fully compromise user accounts on cal.com instances, leading to unauthorized access to sensitive scheduling information, potential data leakage, and disruption of business operations. Organizations relying on cal.com for internal or customer-facing scheduling could face privacy violations under GDPR due to unauthorized data access. The ability to impersonate users without authentication or interaction increases the likelihood of automated or targeted attacks, potentially enabling lateral movement within networks if cal.com is integrated with other internal systems. The critical severity and network exploitability mean that attackers can remotely compromise systems at scale, impacting availability and trust in organizational services. Additionally, compromised accounts could be leveraged for social engineering or phishing campaigns targeting European users. The reputational damage and regulatory consequences for mishandling personal data could be significant, especially in sectors like healthcare, finance, and public services where scheduling data is sensitive.

Mitigation Recommendations

European organizations should immediately upgrade all cal.com deployments to version 6.0.7 or later, where the vulnerability is patched. Until upgrades are completed, implement strict network segmentation and firewall rules to restrict access to cal.com instances only to trusted internal networks or VPN users. Conduct thorough audits of user account activity and session management logs to detect any unauthorized access attempts. Disable or restrict the use of session.update() functionality if possible, or apply custom server-side validation to ensure email addresses cannot be arbitrarily set by clients. Employ multi-factor authentication (MFA) for all user accounts to reduce the impact of compromised credentials. Monitor threat intelligence feeds for emerging exploit attempts targeting this vulnerability. Finally, review and enhance authorization logic in custom integrations with cal.com to prevent similar client-side enforcement issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T15:47:41.627Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6966bf90a60475309fb963d3

Added to database: 1/13/2026, 9:56:32 PM

Last enriched: 1/21/2026, 2:32:45 AM

Last updated: 2/7/2026, 1:10:25 AM

Views: 182

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats