Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rallly
Rallly rallly |
|
| Vendors & Products |
Rallly
Rallly rallly |
Wed, 19 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4. | |
| Title | Rallly Has Unauthorized Poll Duplication via Insecure Direct Object Reference (IDOR) | |
| Weaknesses | CWE-285 CWE-639 CWE-862 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-19T17:24:12.583Z
Updated: 2025-11-19T21:12:41.130Z
Reserved: 2025-11-13T15:36:51.681Z
Link: CVE-2025-65020
Updated: 2025-11-19T21:12:37.875Z
Status : Undergoing Analysis
Published: 2025-11-19T18:15:49.477
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-65020
No data.