CVE-2025-65021
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rallly | rallly | to 4.5.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Insecure Direct Object Reference (IDOR) in Rallly's poll finalization feature prior to version 4.5.4. It allows any authenticated user to finalize a poll they do not own by manipulating the pollId parameter, bypassing authorization checks. This means unauthorized users can finalize other users' polls and convert them into events.
How can this vulnerability impact me? :
The vulnerability can disrupt user workflows by allowing unauthorized users to finalize polls they do not own, potentially causing data integrity and availability issues within the application.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Rallly to version 4.5.4 or later, as this version contains the patch that fixes the Insecure Direct Object Reference (IDOR) vulnerability in the poll finalization feature.