CVE-2025-65031

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users of Rallly to impersonate any other user by manipulating the authorName field in comment creation API requests. Attackers can post comments under arbitrary usernames, including administrators, potentially enabling phishing or social engineering attacks. All Rallly instances running versions before 4.5.4 are affected.

💻 Affected Systems

Products:
  • Rallly
Versions: All versions prior to 4.5.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with user authentication enabled. Self-hosted deployments are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers impersonate administrators to issue malicious instructions, approve harmful changes, or spread disinformation that leads to data breaches or system compromise.

🟠

Likely Case

Attackers impersonate regular users to spread misleading information, create confusion in scheduling, or conduct targeted phishing against specific users.

🟢

If Mitigated

With proper monitoring and user awareness, impact is limited to temporary confusion and minor reputation damage until detected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial via API manipulation. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.4

Vendor Advisory: https://github.com/lukevella/rallly/security/advisories/GHSA-hhfc-6gq7-rrpm

Restart Required: Yes

Instructions:

1. Backup your Rallly instance and database. 2. Update to version 4.5.4 via package manager or manual installation. 3. Restart the Rallly service. 4. Verify the update was successful.

🔧 Temporary Workarounds

API Request Validation

all

Implement server-side validation to ensure authorName matches authenticated user identity

Modify comment creation endpoint to validate user identity against session/token

Disable Comment Functionality

all

Temporarily disable comment creation until patch can be applied

Disable POST /api/comments endpoint in web server configuration

🧯 If You Can't Patch

  • Implement strict API monitoring and alerting for unusual comment activity
  • Educate users to verify suspicious comments and report impersonation attempts

🔍 How to Verify

Check if Vulnerable:

Test if you can create a comment with a different username than your authenticated identity via API

Check Version:

Check package.json for version or run 'npm list rallly' if installed via npm

Verify Fix Applied:

Attempt to create a comment with a different username - should be rejected or corrected to your actual username

📡 Detection & Monitoring

Log Indicators:

  • API requests to comment endpoint with mismatched authorName and user session
  • Multiple comments from same IP with different usernames

Network Indicators:

  • Unusual comment patterns or rapid username switching in API traffic

SIEM Query:

source="rallly" AND (path="/api/comments" AND method="POST") AND authorName != user_identity

🔗 References

📤 Share & Export