Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability allows any authenticated user to change the display names of other participants in polls without being an admin or the poll owner. By manipulating the participantId parameter in a rename request, an attacker can modify another user’s name, violating data integrity and potentially causing confusion or impersonation attacks. This issue has been patched in version 4.5.4.
References
| Link | Resource |
|---|---|
| https://github.com/lukevella/rallly/releases/tag/v4.5.4 | Release Notes |
| https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw | Exploit Vendor Advisory |
| https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw | Exploit Vendor Advisory |
Configurations
History
24 Nov 2025, 19:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:* | |
| References | () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - Release Notes | |
| References | () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw - Exploit, Vendor Advisory | |
| First Time |
Rallly rallly
Rallly |
19 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw - |
19 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-19 18:15
Updated : 2025-11-24 19:33
NVD link : CVE-2025-65032
Mitre link : CVE-2025-65032
CVE.ORG link : CVE-2025-65032
JSON object : View
Products Affected
rallly
- rallly
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
