Cyber Posture

CVE-2025-66489

CriticalPublic PoC

Published: 03 December 2025

Published
03 December 2025
Modified
13 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0027 51.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66489 is a critical-severity Incorrect Implementation of Authentication Algorithm (CWE-303) vulnerability in Cal Cal.Com. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 49.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires systems to correctly identify and authenticate organizational users using defined authenticators, directly preventing the TOTP-based password bypass in Cal.com's authentication flow.

prevent

Mandates proper management of authenticators including TOTP, addressing mishandling in the login credentials provider's conditional logic.

prevent

Requires timely identification, reporting, and correction of system flaws, such as patching Cal.com to version 5.9.8 to remediate the authentication bypass vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Critical authentication bypass in public-facing scheduling web application (AV:N/PR:N) directly enables unauthenticated remote exploitation for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to…

more

problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Deeper analysisAI

CVE-2025-66489 is a critical authentication bypass vulnerability in Cal.com, an open-source scheduling software. In versions prior to 5.9.8, a flaw in the login credentials provider enables attackers to skip password verification when a TOTP code is supplied, stemming from faulty conditional logic in the authentication flow. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-303 (Incorrect Implementation of Authentication Algorithm).

Any unauthenticated attacker with network access can exploit this issue remotely with low complexity and no user interaction required. Exploitation allows bypassing password checks during login attempts that include a valid TOTP code, resulting in unauthorized access to affected user accounts and high-impact compromise of confidentiality, integrity, and availability.

The vulnerability is remediated in Cal.com version 5.9.8. Additional details on the fix and affected configurations are available in the GitHub security advisory at https://github.com/calcom/cal.com/security/advisories/GHSA-9r3w-4j8q-pw98.

Details

CWE(s)

Affected Products

cal
cal.com
≤ 5.9.8

CVEs Like This One

CVE-2026-23478Same product: Cal Cal.Com
CVE-2025-57808Shared CWE-303
CVE-2025-23046Shared CWE-303
CVE-2025-14273Shared CWE-303
CVE-2025-14510Shared CWE-303
CVE-2026-28446Shared CWE-303
CVE-2025-13390Shared CWE-303
CVE-2025-4676Shared CWE-303
CVE-2025-21311Shared CWE-303
CVE-2026-43640Shared CWE-303

References