Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owners and administrators. The endpoint relies solely on the comment ID for deletion and does not validate whether the requesting user owns the comment or has permission to remove it. This issue has been patched in version 4.5.4.
References
| Link | Resource |
|---|---|
| https://github.com/lukevella/rallly/releases/tag/v4.5.4 | Release Notes |
| https://github.com/lukevella/rallly/security/advisories/GHSA-4j32-25f9-qgfm | Exploit Vendor Advisory |
Configurations
History
25 Nov 2025, 15:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - Release Notes | |
| References | () https://github.com/lukevella/rallly/security/advisories/GHSA-4j32-25f9-qgfm - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:* | |
| First Time |
Rallly rallly
Rallly |
19 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-19 18:15
Updated : 2025-11-25 15:33
NVD link : CVE-2025-65030
Mitre link : CVE-2025-65030
CVE.ORG link : CVE-2025-65030
JSON object : View
Products Affected
rallly
- rallly
