Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
History

Mon, 24 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

Fri, 21 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Rallly
Rallly rallly
Vendors & Products Rallly
Rallly rallly

Wed, 19 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Description Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
Title Rallly Improper Authorization Allows Reopening of Any Finalized Poll via Public pollId
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-19T17:26:59.038Z

Updated: 2025-11-19T20:20:04.793Z

Reserved: 2025-11-13T15:36:51.684Z

Link: CVE-2025-65034

cve-icon Vulnrichment

Updated: 2025-11-19T20:12:33.123Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-19T18:15:51.300

Modified: 2025-11-24T18:02:45.307

Link: CVE-2025-65034

cve-icon Redhat

No data.