CVE-2025-65030

7.1 HIGH

📋 TL;DR

An authorization flaw in Rallly's comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owners and administrators. This vulnerability affects all Rallly instances running versions prior to 4.5.4 where user authentication is enabled.

💻 Affected Systems

Products:
  • Rallly
Versions: All versions prior to 4.5.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with user authentication enabled. Self-hosted instances are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could systematically delete all comments in polls, disrupting collaboration and potentially destroying important scheduling information or discussions.

🟠

Likely Case

Users deleting comments they shouldn't have access to, causing confusion and data integrity issues in collaborative scheduling sessions.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though unauthorized deletions could still occur until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated. No special tools or knowledge needed beyond basic API understanding.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.4

Vendor Advisory: https://github.com/lukevella/rallly/security/advisories/GHSA-4j32-25f9-qgfm

Restart Required: Yes

Instructions:

1. Backup your Rallly instance data. 2. Update to version 4.5.4 using your deployment method (Docker, manual, etc.). 3. Restart the Rallly service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable comment deletion API

all

Temporarily disable or block access to the comment deletion endpoint until patching can be completed.

# Configure web server or firewall to block DELETE requests to /api/comments/* endpoints

Implement API gateway authorization

all

Add authorization layer in front of Rallly that validates user permissions before forwarding deletion requests.

# Configure reverse proxy or API gateway to validate user ownership before allowing comment deletion

🧯 If You Can't Patch

  • Implement strict access controls and monitor all comment deletion activities in logs
  • Educate users about the vulnerability and implement manual approval process for comment deletions

🔍 How to Verify

Check if Vulnerable:

Check if your Rallly version is below 4.5.4. Test by having a regular authenticated user attempt to delete another user's comment via API.

Check Version:

Check Rallly web interface footer or API response headers for version information

Verify Fix Applied:

After updating to 4.5.4, test that regular users can only delete their own comments and cannot delete comments belonging to other users.

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE requests to /api/comments/ endpoints from single user
  • DELETE requests to comment IDs not owned by requesting user

Network Indicators:

  • Unusual pattern of DELETE requests to comment API
  • DELETE requests with mismatched user-comment ownership

SIEM Query:

source="rallly" AND method="DELETE" AND uri="/api/comments/*" | stats count by user, uri

🔗 References

📤 Share & Export