Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cal
Cal cal.com |
|
| Vendors & Products |
Cal
Cal cal.com |
Wed, 03 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8. | |
| Title | Cal.com Authentication Bypass via bad TOTP + password checks | |
| Weaknesses | CWE-303 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-03T21:48:27.861Z
Reserved: 2025-12-02T22:44:04.707Z
Link: CVE-2025-66489
Updated: 2025-12-03T21:48:23.065Z
Status : Analyzed
Published: 2025-12-03T20:16:27.057
Modified: 2026-02-13T16:03:36.057
Link: CVE-2025-66489
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:43:52Z