Home

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-19 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 4.5.4
affected

References

github.com/...rallly/security/advisories/GHSA-5fp2-pv2j-rqpc exploit

github.com/...rallly/security/advisories/GHSA-5fp2-pv2j-rqpc

github.com/lukevella/rallly/releases/tag/v4.5.4

cve.org (CVE-2025-65034)

nvd.nist.gov (CVE-2025-65034)

Download JSON