cal.com affected by CVE-2025-66478? #25598
-
|
There is a newly disclosed CVSS 10 RCE vulnerability in certain versions of React/NextJS, see GHSA-9qr9-h5gf-34mp Did somebody already analyze if Cal.com is affected by this? The NextJS version seems to be vulnerable but the react version not? |
Beta Was this translation helpful? Give feedback.
Replies: 12 comments 29 replies
-
|
They are. |
Beta Was this translation helpful? Give feedback.
-
|
Is it possible to get any official word on this? I saw this commit bumping the versions, but the 5.9.9 release notes just casually mention "bump nextjs version". If this project is truly affected by this vulnerability It might be good to send a security notice for everyone to upgrade? I'm just concerned about all the folks who are hosting the project themselves and are not aware of the implications if they do not upgrade. |
Beta Was this translation helpful? Give feedback.
-
|
yep, my self hosted vps running cal.com was hit and a crypto miner installed. 🤯 I only noticed when the cpu was maxed out - a real pain! |
Beta Was this translation helpful? Give feedback.
-
|
Florian just published, that they have detection rules (THOR) for CVE-2025-55182 react2shell .. https://x.com/cyb3rops/status/1997256280126242926 |
Beta Was this translation helpful? Give feedback.
-
|
Looks like my docker compose run was compomissed, I opened a discussion here with my log some minutes ago and my account How could the exploration of this vuln affects my Microsoft/Google keys and other docker containers running on same server? I time, there is anything calcom can do to advocate for my account to ask Github to reinstate it? |
Beta Was this translation helpful? Give feedback.
-
|
Anyone who operates a cal.com instance themselves and has not updated it by Friday, December 5, or taken the server offline, should check their server for webshells, cryptominers, etc. – do yourself a favor and run THOR (an IOC scanner) on it. The Lite version should also include the React2Shell Sigma Rules for detecting attack patterns... but I'm not 100% sure at the moment. |
Beta Was this translation helpful? Give feedback.
-
|
Just noticed that my system was hacked. It did not receive the update due to bug #25182 I would love to simply kill the image and reload a working :latest one that I can run on my server. Question is how? |
Beta Was this translation helpful? Give feedback.
-
|
Two more CVE incoming, https://nextjs.org/blog/security-update-2025-12-11 As far as I can tell cal.com is one version behind the fix (next 15.5.8 < 15.5.9). (I hope no .env variables are compiled into the source code on docker container startup, need to have a look into it. I believe only the URLs are hardcoded replaced on startup into the source code.) |
Beta Was this translation helpful? Give feedback.
-
|
Just adding a data point for anyone investigating this on their machine: I found XMRig running inside my Cal.com container, dropped as /tmp/.XIN-unix/javae with a standard config.json pointing to pool.supportxmr.com. Additional symptom that may be related:
Key observations:
Hope this helps others debugging similar symptoms. |
Beta Was this translation helpful? Give feedback.
-
|
https://beelzebub.ai/blog/threat-huntinga-analysis-of-a-nextjs-exploit-campaign/ "What they're doing:
Analysing the 5.9.12 image, still shows a lot of out-dated dependecies - not related to next.js.. |
Beta Was this translation helpful? Give feedback.
-
|
FYI @keithwillcode @emrysal, the latest version on Docker Hub is 5.9.14. I will wait until newer versions can be added before running it again: https://hub.docker.com/r/calcom/cal.com/tags |
Beta Was this translation helpful? Give feedback.
-
|
My main GitHub account Please, there is any change of someone on calcom side (@PeerRich @hariombalhara @alishaz-polymath) asks GitHub to unban my account? I opened a ticket but no answer until now |
Beta Was this translation helpful? Give feedback.

Hey all. First off, apologies for the delay on this. We've been way too slow to respond and it's something we'll be fixing internally so our reaction time is much faster.
Here is an advisory I've just published with links to all places to get v5.9.9 / v5.9.10 or the direct patch. GHSA-qjx2-5xqp-cpf4