CVE-2025-65032

6.5 MEDIUM

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in Rallly allows authenticated users to change other participants' display names in polls without proper authorization. This affects all Rallly instances running versions prior to 4.5.4. Attackers can manipulate the participantId parameter to modify names, potentially causing confusion or enabling impersonation attacks.

💻 Affected Systems

Products:
  • Rallly
Versions: All versions prior to 4.5.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: This affects all Rallly deployments regardless of configuration. The vulnerability exists in the core application logic for handling participant rename requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could systematically rename all participants in sensitive polls to cause confusion, impersonate administrators or key stakeholders, disrupt decision-making processes, or create misleading audit trails.

🟠

Likely Case

Malicious users rename other participants to cause confusion, create inappropriate names, or impersonate others in collaborative scheduling sessions, undermining trust in the platform.

🟢

If Mitigated

With proper access controls and input validation, only poll owners or administrators can modify participant names, maintaining data integrity and preventing unauthorized changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated. Attackers simply need to modify the participantId parameter in rename requests to target other users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.4

Vendor Advisory: https://github.com/lukevella/rallly/security/advisories/GHSA-q9m7-chfx-43xw

Restart Required: Yes

Instructions:

1. Backup your Rallly instance and database. 2. Update to version 4.5.4 or later using your deployment method (Docker, manual, etc.). 3. Restart the Rallly service. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Implement API-level access controls

all

Add server-side authorization checks to verify users can only rename participants they own or have permission to modify.

Not applicable - requires code modification

Rate limit rename requests

all

Implement rate limiting on participant rename endpoints to limit potential damage from automated attacks.

Not applicable - requires infrastructure configuration

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Rallly instances to trusted users only
  • Enable detailed logging of all participant modification events and monitor for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check if your Rallly version is below 4.5.4. Attempt to rename another user's participant entry by modifying the participantId parameter in a rename request (test in controlled environment only).

Check Version:

Check the Rallly web interface footer or API endpoint for version information, or inspect the Docker container tag if using Docker.

Verify Fix Applied:

After updating to 4.5.4+, attempt the same rename attack. It should fail with proper authorization error. Verify the version shows 4.5.4 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rename requests from same user targeting different participant IDs
  • Rename requests where requester ID doesn't match participant owner ID
  • Unusual spike in participant modification activity

Network Indicators:

  • POST requests to participant rename endpoints with modified participantId parameters
  • Pattern of rename requests across multiple poll IDs from single source

SIEM Query:

source="rallly" AND (event="participant_rename" OR endpoint="/api/participants/*/rename") | stats count by user_id, participant_id | where count > threshold

🔗 References

📤 Share & Export