{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-65020","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-13T15:36:51.681Z","datePublished":"2025-11-19T17:24:12.583Z","dateUpdated":"2025-11-19T21:12:41.130Z"},"containers":{"cna":{"title":"Rallly Has Unauthorized Poll Duplication via Insecure Direct Object Reference (IDOR)","problemTypes":[{"descriptions":[{"cweId":"CWE-285","lang":"en","description":"CWE-285: Improper Authorization","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-639","lang":"en","description":"CWE-639: Authorization Bypass Through User-Controlled Key","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-862","lang":"en","description":"CWE-862: Missing Authorization","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/lukevella/rallly/security/advisories/GHSA-44w7-pf32-gv5m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/lukevella/rallly/security/advisories/GHSA-44w7-pf32-gv5m"},{"name":"https://github.com/lukevella/rallly/releases/tag/v4.5.4","tags":["x_refsource_MISC"],"url":"https://github.com/lukevella/rallly/releases/tag/v4.5.4"}],"affected":[{"vendor":"lukevella","product":"rallly","versions":[{"version":"< 4.5.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-19T17:24:12.583Z"},"descriptions":[{"lang":"en","value":"Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4."}],"source":{"advisory":"GHSA-44w7-pf32-gv5m","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-19T21:12:32.660305Z","id":"CVE-2025-65020","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-19T21:12:41.130Z"}}]}}