Skip to content
Discussion options

You must be logged in to vote

Yes, CVE-2025-55182, which affected Rallly v4.5.8 and earlier, can allow remote code execution if exploited. It’s safest to assume an attacker could access anything the application process can access inside the container, including environment variables and other secrets (for example SMTP credentials).

In response to this issue, I rotated credentials for the production instance and recommend you do the same for any affected self-hosted deployments.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@jonathan8devs
Comment options

Answer selected by jonathan8devs
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants