Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to authorize deletions, enabling attackers to remove other users (including poll owners) from polls. This impacts the integrity and availability of poll participation data. This issue has been patched in version 4.5.4.
Problem types
CWE-285: Improper Authorization
CWE-639: Authorization Bypass Through User-Controlled Key
CWE-862: Missing Authorization
Product status
References
github.com/...rallly/security/advisories/GHSA-f8jc-6746-ww95
github.com/lukevella/rallly/releases/tag/v4.5.4