Cal.com authentication bypass (CVE-2026-23478) — patch, rotate, and treat scheduling as critical

Cal.com authentication bypass (CVE-2026-23478): one line of code, full account takeover — is your scheduling stack a ticking time bomb?

If you rely on Cal.com for bookings, calendars or customer scheduling, stop whatever you’re doing and read this. Less than an hour ago (reported 29 minutes ago) a critical vulnerability — CVE-2026-23478 — was disclosed in Cal.com’s custom JWT callback. Versions 3.1.6 through before 6.0.7 are affected; the issue is fixed in 6.0.7. The flaw allows an attacker to gain full authenticated access to any user account by supplying a target email address via session.update().

What happened (plain and factual)

Cal.com is open-source scheduling software used by organisations to handle bookings and calendar access. The vulnerability in question is an authentication bypass in a custom NextAuth JWT callback: by supplying a target email address through session.update(), an attacker can obtain authenticated access to another user’s account. Affected versions are 3.1.6 up to, but not including, 6.0.7; the vendor’s fix is available in 6.0.7.

Why this matters to your business

This isn’t just an awkward admin bug. Scheduling systems are rich with business-critical data: personal contact details, meeting times, conference links, customer notes and sometimes attachments. An attacker who can impersonate users can:

  • Access sensitive customer or employee calendars and personal data;

  • Intercept meeting links or service credentials shared via appointments;

  • Modify or cancel bookings, causing operational disruption and customer harm;

  • Use account access as a stepping-stone to other systems (credential harvesting, phishing from trusted accounts, lateral movement).

Those outcomes translate to regulatory exposure (think data protection and privacy laws), angry customers, wasted staff hours, and awkward conversations with the board. Treating a scheduling app as “not-core” is a risky shortcut: attackers love soft targets with high trust.

What could happen if you do nothing

Ignore this and you might find yourself firefighting a slow, quiet compromise rather than a dramatic ransomware firestorm — which is worse in its own way. Compromised accounts can be abused subtly for weeks or months, quietly siphoning information or enabling targeted phishing from trusted addresses. Recovery costs escalate when attackers have had time to chain access or exfiltrate data, and insurance or regulator enquiries generally prefer evidence of timely patching and good risk management.

How recognised standards would have helped (yes, ISO 27001 actually matters)

An ISO 27001 information security management system provides a framework for identifying and treating exactly this class of supply-chain and application risk. Relevant controls and processes include secure development practices, change and configuration management, attacker-resistant authentication, vulnerability management, and supplier assurance.

Concretely, an ISO 27001-aligned approach would: require a documented third‑party risk assessment for any externally maintained component; demand timely patching and vulnerability monitoring; ensure multi-factor authentication and least-privilege principles are applied where possible; and make sure incident response roles and playbooks exist so the business can act fast when a fix is published.

Combine that with ISO 22301 business continuity planning so service disruption from a compromised scheduling platform doesn’t grind operations to a halt while you investigate, and you’ll sleep better at night. For practical baseline controls, Cyber Essentials and IASME help organisations demonstrate basic hygiene, and security awareness training reduces the odds of attackers successfully exploiting access gained via trusted accounts.

Immediate and practical actions — what to do now

Take these sensible, achievable steps this morning (yes, before your first coffee cools):

  • Patch: Update any Cal.com instances to version 6.0.7 immediately where feasible.

  • Assess exposure: Identify which systems integrate with Cal.com, which service accounts and API keys are used, and which user roles could be abused.

  • Rotate secrets: Where Cal.com credentials, API keys or webhooks are in use, rotate them and review permissions to enforce least privilege.

  • Enforce MFA and SSO: Require multi-factor authentication or federated SSO for admin and high‑privilege users if supported.

  • Monitor and log: Increase monitoring of authentication anomalies, session updates and unusual calendar changes; preserve logs for investigation.

  • Communicate and plan: Notify your incident response and communications teams, and prepare a customer-facing message if account compromise is suspected.

Longer-term, sensible improvements

Beyond the immediate patch-and-protect, embed these changes into your security programme: a formal vulnerability management process (with SLAs tied to severity), secure development lifecycles and code review, and supplier management that treats key open-source components as critical vendors. If you’re responsible for procurement, insist on demonstrable security practices from vendors and maintain an up-to-date inventory of third‑party components.

Synergos services can help tie these actions into accredited, auditable frameworks — from implementing ISO 27001 and practical Cyber Essentials controls to security awareness via usecure and ongoing support through our support packages. For continuity planning that keeps you serving customers through the chaos, see our ISO 22301 guidance.

Final nudge

This Cal.com flaw is a tidy reminder that even “small” infrastructure components can grant attackers a golden key. Patch promptly, review supplier and component risk, and make sure your authentication and incident processes are fit for purpose — or you may learn the hard way that a scheduling app isn’t just a calendar, it’s part of your company’s front door.

If you use Cal.com (or any third‑party scheduling tool), patch to 6.0.7 now, rotate credentials and review access controls to prevent account takeover and protect your customers and reputation.

Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue