CVE-2025-65032

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability allows any authenticated user to change the display names of other participants in polls without being an admin or the poll owner. By manipulating the participantId parameter in a rename request, an attacker can modify another user’s name, violating data integrity and potentially causing confusion or impersonation attacks. This issue has been patched in version 4.5.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

History

24 Nov 2025, 19:33

Type Values Removed Values Added
CPE cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*
References () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - Release Notes
References () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw - () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw - Exploit, Vendor Advisory
First Time Rallly rallly
Rallly

19 Nov 2025, 19:15

Type Values Removed Values Added
References () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw - () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw -

19 Nov 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 18:15

Updated : 2025-11-24 19:33


NVD link : CVE-2025-65032

Mitre link : CVE-2025-65032

CVE.ORG link : CVE-2025-65032


JSON object : View

Products Affected

rallly

  • rallly
CWE
CWE-639

Authorization Bypass Through User-Controlled Key