Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability allows any authenticated user to change the display names of other participants in polls without being an admin or the poll owner. By manipulating the participantId parameter in a rename request, an attacker can modify another user’s name, violating data integrity and potentially causing confusion or impersonation attacks. This issue has been patched in version 4.5.4.
History

Mon, 24 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

Fri, 21 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Rallly
Rallly rallly
Vendors & Products Rallly
Rallly rallly

Wed, 19 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Description Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability allows any authenticated user to change the display names of other participants in polls without being an admin or the poll owner. By manipulating the participantId parameter in a rename request, an attacker can modify another user’s name, violating data integrity and potentially causing confusion or impersonation attacks. This issue has been patched in version 4.5.4.
Title Rallly Has an IDOR Vulnerability in Participant Rename Function Allows Unauthorized Modification of Other Users’ Names
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-19T17:26:09.648Z

Updated: 2025-11-19T18:50:41.841Z

Reserved: 2025-11-13T15:36:51.683Z

Link: CVE-2025-65032

cve-icon Vulnrichment

Updated: 2025-11-19T18:50:32.724Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-19T18:15:50.930

Modified: 2025-11-24T19:33:13.700

Link: CVE-2025-65032

cve-icon Redhat

No data.