CVE-2025-66489

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*

History

13 Feb 2026, 16:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/calcom/cal.com/security/advisories/GHSA-9r3w-4j8q-pw98 - () https://github.com/calcom/cal.com/security/advisories/GHSA-9r3w-4j8q-pw98 - Third Party Advisory, Exploit
CPE cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*
First Time Cal cal.com
Cal

03 Dec 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-03 20:16

Updated : 2026-02-13 16:03


NVD link : CVE-2025-66489

Mitre link : CVE-2025-66489

CVE.ORG link : CVE-2025-66489


JSON object : View

Products Affected

cal

  • cal.com
CWE
CWE-303

Incorrect Implementation of Authentication Algorithm