Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Dec 2025 01:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cal
Cal cal.com |
|
| Vendors & Products |
Cal
Cal cal.com |
Thu, 04 Dec 2025 07:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Dec 2025 05:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8. | |
| Title | Cal.com Authentication Bypass via bad TOTP + password checks | |
| Weaknesses | CWE-303 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-03T21:48:27.861Z
Reserved: 2025-12-02T22:44:04.707Z
Link: CVE-2025-66489
Updated: 2025-12-03T21:48:23.065Z
Status : Awaiting Analysis
Published: 2025-12-03T20:16:27.057
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-66489
No data.
OpenCVE Enrichment
Updated: 2025-12-05T01:43:52Z