Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not own by manipulating the pollId parameter in the request. This allows unauthorized users to finalize other users’ polls and convert them into events without proper authorization checks, potentially disrupting user workflows and causing data integrity and availability issues. This issue has been patched in version 4.5.4.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Rallly
Rallly rallly
Vendors & Products Rallly
Rallly rallly

Wed, 19 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Description Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not own by manipulating the pollId parameter in the request. This allows unauthorized users to finalize other users’ polls and convert them into events without proper authorization checks, potentially disrupting user workflows and causing data integrity and availability issues. This issue has been patched in version 4.5.4.
Title Rallly Has Unauthorized Poll Finalization via Insecure Direct Object Reference (IDOR)
Weaknesses CWE-285
CWE-639
CWE-862
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-19T17:24:31.084Z

Updated: 2025-11-19T21:13:27.620Z

Reserved: 2025-11-13T15:36:51.681Z

Link: CVE-2025-65021

cve-icon Vulnrichment

Updated: 2025-11-19T21:13:21.851Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2025-11-19T18:15:49.667

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-65021

cve-icon Redhat

No data.