CVE-2025-65030

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owners and administrators. The endpoint relies solely on the comment ID for deletion and does not validate whether the requesting user owns the comment or has permission to remove it. This issue has been patched in version 4.5.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

History

25 Nov 2025, 15:33

Type Values Removed Values Added
References () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - Release Notes
References () https://github.com/lukevella/rallly/security/advisories/GHSA-4j32-25f9-qgfm - () https://github.com/lukevella/rallly/security/advisories/GHSA-4j32-25f9-qgfm - Exploit, Vendor Advisory
CPE cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*
First Time Rallly rallly
Rallly

19 Nov 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 18:15

Updated : 2025-11-25 15:33


NVD link : CVE-2025-65030

Mitre link : CVE-2025-65030

CVE.ORG link : CVE-2025-65030


JSON object : View

Products Affected

rallly

  • rallly
CWE
CWE-285

Improper Authorization

CWE-639

Authorization Bypass Through User-Controlled Key