Unrated severityNVD Advisory· Published Nov 19, 2025· Updated Nov 19, 2025
Rallly Improper Authorization in Comment Endpoint Allows User Impersonation
CVE-2025-65031
Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization flaw in the comment creation endpoint allows authenticated users to impersonate any other user by altering the authorName field in the API request. This enables attackers to post comments under arbitrary usernames, including privileged ones such as administrators, potentially misleading other users and enabling phishing or social engineering attacks. This issue has been patched in version 4.5.4.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/lukevella/rallly/releases/tag/v4.5.4mitrex_refsource_MISC
- github.com/lukevella/rallly/security/advisories/GHSA-hhfc-6gq7-rrpmmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.