Home

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-19 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-285: Improper Authorization

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-862: Missing Authorization

Product status

< 4.5.4
affected

References

github.com/...rallly/security/advisories/GHSA-44w7-pf32-gv5m

github.com/lukevella/rallly/releases/tag/v4.5.4

cve.org (CVE-2025-65020)

nvd.nist.gov (CVE-2025-65020)

Download JSON