Vulnerability Details CVE-2025-65029
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endpoint relies solely on a participant ID to authorize deletions, enabling attackers to remove other users (including poll owners) from polls. This impacts the integrity and availability of poll participation data. This issue has been patched in version 4.5.4.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.1%
CVSS Severity
CVSS v3 Score 8.1
Products affected by CVE-2025-65029
-
cpe:2.3:a:rallly:rallly:2.0.0
-
cpe:2.3:a:rallly:rallly:2.1.0
-
cpe:2.3:a:rallly:rallly:2.1.1
-
cpe:2.3:a:rallly:rallly:2.10.0
-
cpe:2.3:a:rallly:rallly:2.11.0
-
cpe:2.3:a:rallly:rallly:2.11.1
-
cpe:2.3:a:rallly:rallly:2.2.0
-
cpe:2.3:a:rallly:rallly:2.2.1
-
cpe:2.3:a:rallly:rallly:2.2.2
-
cpe:2.3:a:rallly:rallly:2.2.3
-
cpe:2.3:a:rallly:rallly:2.3.0
-
cpe:2.3:a:rallly:rallly:2.3.1
-
cpe:2.3:a:rallly:rallly:2.4.0
-
cpe:2.3:a:rallly:rallly:2.4.1
-
cpe:2.3:a:rallly:rallly:2.5.0
-
cpe:2.3:a:rallly:rallly:2.5.1
-
cpe:2.3:a:rallly:rallly:2.6.0
-
cpe:2.3:a:rallly:rallly:2.7.0
-
cpe:2.3:a:rallly:rallly:2.7.1
-
cpe:2.3:a:rallly:rallly:2.8.0
-
cpe:2.3:a:rallly:rallly:2.8.1
-
cpe:2.3:a:rallly:rallly:2.8.2
-
cpe:2.3:a:rallly:rallly:2.8.3
-
cpe:2.3:a:rallly:rallly:2.9.0
-
cpe:2.3:a:rallly:rallly:2.9.1
-
cpe:2.3:a:rallly:rallly:2.9.2
-
cpe:2.3:a:rallly:rallly:3.0.0
-
cpe:2.3:a:rallly:rallly:3.0.1
-
cpe:2.3:a:rallly:rallly:3.1.0
-
cpe:2.3:a:rallly:rallly:3.1.1
-
cpe:2.3:a:rallly:rallly:3.10.0
-
cpe:2.3:a:rallly:rallly:3.10.1
-
cpe:2.3:a:rallly:rallly:3.11.0
-
cpe:2.3:a:rallly:rallly:3.11.1
-
cpe:2.3:a:rallly:rallly:3.11.2
-
cpe:2.3:a:rallly:rallly:3.2.0
-
cpe:2.3:a:rallly:rallly:3.2.1
-
cpe:2.3:a:rallly:rallly:3.3.0
-
cpe:2.3:a:rallly:rallly:3.4.0
-
cpe:2.3:a:rallly:rallly:3.4.1
-
cpe:2.3:a:rallly:rallly:3.4.2
-
cpe:2.3:a:rallly:rallly:3.5.0
-
cpe:2.3:a:rallly:rallly:3.5.1
-
cpe:2.3:a:rallly:rallly:3.6.0
-
cpe:2.3:a:rallly:rallly:3.6.1
-
cpe:2.3:a:rallly:rallly:3.7.0
-
cpe:2.3:a:rallly:rallly:3.8.0
-
cpe:2.3:a:rallly:rallly:3.8.1
-
cpe:2.3:a:rallly:rallly:3.9.0
-
cpe:2.3:a:rallly:rallly:3.9.1
-
cpe:2.3:a:rallly:rallly:4.0.0
-
cpe:2.3:a:rallly:rallly:4.0.1
-
cpe:2.3:a:rallly:rallly:4.0.2
-
cpe:2.3:a:rallly:rallly:4.1.0
-
cpe:2.3:a:rallly:rallly:4.1.1
-
cpe:2.3:a:rallly:rallly:4.1.2
-
cpe:2.3:a:rallly:rallly:4.2.0
-
cpe:2.3:a:rallly:rallly:4.3.0
-
cpe:2.3:a:rallly:rallly:4.3.1
-
cpe:2.3:a:rallly:rallly:4.4.0
-
cpe:2.3:a:rallly:rallly:4.4.1
-
cpe:2.3:a:rallly:rallly:4.5.0
-
cpe:2.3:a:rallly:rallly:4.5.1
-
cpe:2.3:a:rallly:rallly:4.5.2
-
cpe:2.3:a:rallly:rallly:4.5.3