Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to modify other participants’ votes in polls without authorization. The backend relies solely on the participantId parameter to identify which votes to update, without verifying ownership or poll permissions. This allows an attacker to alter poll results in their favor, directly compromising data integrity. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rallly
Rallly rallly |
|
| Vendors & Products |
Rallly
Rallly rallly |
Wed, 19 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to modify other participants’ votes in polls without authorization. The backend relies solely on the participantId parameter to identify which votes to update, without verifying ownership or poll permissions. This allows an attacker to alter poll results in their favor, directly compromising data integrity. This issue has been patched in version 4.5.4. | |
| Title | Rallly Has an IDOR Vulnerability in Vote Update Endpoint Allows Unauthorized Manipulation of Participant Votes | |
| Weaknesses | CWE-285 CWE-639 CWE-862 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-19T17:23:57.215Z
Updated: 2025-11-19T21:11:46.399Z
Reserved: 2025-11-13T15:36:51.682Z
Link: CVE-2025-65028
Updated: 2025-11-19T21:11:41.451Z
Status : Undergoing Analysis
Published: 2025-11-19T18:15:50.203
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-65028
No data.