Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:* |
Fri, 21 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rallly
Rallly rallly |
|
| Vendors & Products |
Rallly
Rallly rallly |
Wed, 19 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4. | |
| Title | Rallly Improper Authorization Allows Reopening of Any Finalized Poll via Public pollId | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-19T17:26:59.038Z
Updated: 2025-11-19T20:20:04.793Z
Reserved: 2025-11-13T15:36:51.684Z
Link: CVE-2025-65034
Updated: 2025-11-19T20:12:33.123Z
Status : Analyzed
Published: 2025-11-19T18:15:51.300
Modified: 2025-11-24T18:02:45.307
Link: CVE-2025-65034
No data.