Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
References
| Link | Resource |
|---|---|
| https://github.com/lukevella/rallly/commit/59738c04f9a8ec25f0af5ce20ad0eab6cf134963 | Patch |
| https://github.com/lukevella/rallly/releases/tag/v4.5.6 | Release Notes |
| https://github.com/lukevella/rallly/security/advisories/GHSA-65wg-8xgw-f3fg | Exploit Vendor Advisory |
| https://github.com/lukevella/rallly/security/advisories/GHSA-65wg-8xgw-f3fg | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-29 01:16
Updated : 2025-12-03 20:25
NVD link : CVE-2025-66027
Mitre link : CVE-2025-66027
CVE.ORG link : CVE-2025-66027
JSON object : View
Products Affected
rallly
- rallly
