Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
History

Wed, 03 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Rallly
Rallly rallly
Vendors & Products Rallly
Rallly rallly

Mon, 01 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 29 Nov 2025 01:15:00 +0000

Type Values Removed Values Added
Description Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
Title Rallly Information Disclosure Vulnerability in Participant API Leaks Names and Emails Despite Pro Privacy Settings
Weaknesses CWE-200
CWE-284
CWE-359
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-29T00:43:02.452Z

Updated: 2025-12-01T14:11:22.446Z

Reserved: 2025-11-21T01:08:02.614Z

Link: CVE-2025-66027

cve-icon Vulnrichment

Updated: 2025-12-01T14:09:38.685Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-29T01:16:02.807

Modified: 2025-12-03T20:25:53.390

Link: CVE-2025-66027

cve-icon Redhat

No data.