Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:* |
Fri, 21 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rallly
Rallly rallly |
|
| Vendors & Products |
Rallly
Rallly rallly |
Wed, 19 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the poll management feature allows any authenticated user to pause or resume any poll, regardless of ownership. The system only uses the public pollId to identify polls, and it does not verify whether the user performing the action is the poll owner. As a result, any user can disrupt polls created by others, leading to a loss of integrity and availability across the application. This issue has been patched in version 4.5.4. | |
| Title | Rallly Broken Authorization: Any User Can Pause or Resume Any Poll via Poll ID Manipulation | |
| Weaknesses | CWE-285 CWE-639 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-19T17:26:44.807Z
Updated: 2025-11-19T20:03:45.344Z
Reserved: 2025-11-13T15:36:51.683Z
Link: CVE-2025-65033
Updated: 2025-11-19T20:03:31.471Z
Status : Analyzed
Published: 2025-11-19T18:15:51.107
Modified: 2025-11-24T18:02:25.047
Link: CVE-2025-65033
No data.