Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization flaw in the comment creation endpoint allows authenticated users to impersonate any other user by altering the authorName field in the API request. This enables attackers to post comments under arbitrary usernames, including privileged ones such as administrators, potentially misleading other users and enabling phishing or social engineering attacks. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rallly
Rallly rallly |
|
| Vendors & Products |
Rallly
Rallly rallly |
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization flaw in the comment creation endpoint allows authenticated users to impersonate any other user by altering the authorName field in the API request. This enables attackers to post comments under arbitrary usernames, including privileged ones such as administrators, potentially misleading other users and enabling phishing or social engineering attacks. This issue has been patched in version 4.5.4. | |
| Title | Rallly Improper Authorization in Comment Endpoint Allows User Impersonation | |
| Weaknesses | CWE-285 CWE-639 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-19T17:25:49.058Z
Updated: 2025-11-19T18:35:00.771Z
Reserved: 2025-11-13T15:36:51.682Z
Link: CVE-2025-65031
Updated: 2025-11-19T18:34:30.568Z
Status : Undergoing Analysis
Published: 2025-11-19T18:15:50.743
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-65031
No data.