Insecure Direct Object Reference in Rallly Scheduling Tool
CVE-2025-65021

9.1CRITICAL

Key Information:

Vendor

Lukevella

Status
Vendor
CVE Published:
19 November 2025

What is CVE-2025-65021?

Rallly, an open-source scheduling and collaboration tool, is impacted by an Insecure Direct Object Reference vulnerability in its poll finalization feature. Prior to version 4.5.4, this vulnerability allows authenticated users to manipulate the pollId parameter in requests, enabling them to finalize polls they do not own. This lack of proper authorization checks can disrupt workflows and lead to data integrity issues, as unauthorized users can hijack and convert other users’ polls into events. Developers have addressed this issue in version 4.5.4, providing users with vital security enhancements.

Affected Version(s)

rallly < 4.5.4

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-65021 : Insecure Direct Object Reference in Rallly Scheduling Tool