Critical Cal.com authentication bypass (CVE-2025-66489) — patch now

Critical Cal.com flaw lets TOTP sidestep passwords — your booking system could be the unlocked back door

Fact check first: security researchers have disclosed CVE-2025-66489, a critical authentication bypass in Cal.com — the popular open-source scheduling platform. Prior to version 5.9.8, a logic error in the login credentials provider allows an attacker to bypass password verification when a Time-based One‑Time Password (TOTP) code is supplied. The vendor has classified this as Severity 9.9 (CRITICAL) and issued a fix in 5.9.8.

Who’s affected and why organisations should care

Cal.com is used by businesses and teams to manage appointments, meetings and customer bookings; many organisations deploy it directly, embed it in websites, or run it as a self‑hosted service tied to internal identity systems. Any deployment that handles real user accounts — particularly those linked to calendars, customer details or integrations with CRM and productivity tools — is at risk until it is patched.

Why this matters: authentication is the front door to everything. An attacker who can bypass password checks using a TOTP vector gains account access without the legitimate password, which can lead to data exposure, fraudulent appointments, business disruption, or pivoting into more sensitive systems via reused credentials and integrations.

What could happen if organisations ignore this

Underestimating an authentication logic bug is a recipe for regret. If similar vulnerabilities are left unpatched, an organisation could face:

  • Account takeovers that expose personal data and commercial information.
  • Unauthorised calendar manipulation that disrupts operations or facilitates fraud (for example, bogus appointments to capture sensitive info).
  • Supply‑chain and integration compromise, where a foothold in a scheduling app is used to access CRM, billing or internal comms tools.
  • Financial and reputational damage from regulatory exposure if personal data is leaked.

How this ties to recognised standards and good practice

ISO 27001 places strong emphasis on access control, cryptography and secure development practices — exactly the areas this CVE touches. Controls such as A.9 (Access control), A.14 (System acquisition, development and maintenance) and A.12 (Operations security) are relevant here: they demand robust authentication, secure coding and patch management processes.

Similarly, ISO 22301 (Business Continuity Management) encourages organisations to plan for service disruption caused by incidents like account takeovers or application compromise. An unpatched authentication bypass can quickly escalate from a single account issue to a continuity incident affecting bookings, customer service and revenue streams.

Immediate technical actions (do these now)

  • Patch immediately: upgrade any Cal.com instances to 5.9.8 or later.
  • Inventory and isolate: identify all deployments (public, private, embedded) and prioritise internet‑facing instances.
  • Review authentication flows: ensure MFA/TOTP checks do not short‑circuit password validation and that multi‑factor verification is atomic and properly ordered.
  • Rotate credentials and tokens for accounts that may have been abused, and revoke stale API keys or sessions.
  • Harden integrations: check connected services (CRMs, calendars, SSO providers) for lateral access and revoke unnecessary privileges.

Medium‑term and process improvements (to stop this recurring)

  • Implement a vulnerability management lifecycle as required by ISO 27001: scan dependencies, prioritise critical fixes and measure patching metrics.
  • Adopt secure development practices: code review, threat modelling and automated tests for authentication logic under A.14.
  • Enhance monitoring and detection: log anomalous authentication events, failed MFA attempts and unexpected session creations.
  • Train teams: make developers and ops aware that multi‑factor checks are part of authentication correctness. Human factors matter — security awareness helps avoid shipping logic that trusts optional inputs.
  • Validate third‑party software governance: require evidence of secure development and timely patching from suppliers, or use compensating controls.

How standards and Synergos services can help

If this CVE has highlighted any gaps in your control set, ISO 27001 provides the framework to build an enduring programme that prevents, detects and responds to such faults. Synergos’s ISO 27001 advisory (https://synergosconsultancy.co.uk/iso27001/) can help bolt these controls into your management system so patching, supplier assurance and secure development aren’t ad‑hoc chores but demonstrable processes.

For continuity planning tied to application outages and compromise, ISO 22301 guidance (https://synergosconsultancy.co.uk/iso-22301-business-continuity-management-system-bcms/) ensures you have playbooks to keep customers and operations moving when a service is disrupted.

Where human error contributes to insecure logic or slow response, targeted security awareness training (https://synergosconsultancy.co.uk/usecure) and broader Cyber Essentials alignment (https://synergosconsultancy.co.uk/iasme-certifications/) reduce the likelihood and impact of such vulnerabilities reaching production.

Putting it into practice — a short checklist for leaders

Executives and technical leads should confirm three things within 24–72 hours:

  • All Cal.com instances are identified and updated to 5.9.8.
  • A short incident review has been carried out: were accounts abused, and what lateral access exists?
  • Immediate remediation plans and a timeline are visible to senior management, aligned to ISO 27001 roles and responsibilities.

Think of it this way: authentication bugs are like a front‑door lock that looks fine but has a secret duplicate key hidden inside the letterbox. Patch the lock, check the hinges, and make sure you’ve got CCTV (logging and monitoring) so you actually see who walks through.

Businesses that treat this as a one‑off miss the point. The right outcomes come from embedding secure design, disciplined patching and tested continuity plans into everyday practice — exactly the sort of work that standards like ISO 27001 and ISO 22301 exist to enforce.

Act now: patch, hunt, and use the incident to harden processes so the same mistake doesn’t turn into a crisis later.

Cal.com users must upgrade to version 5.9.8 immediately and treat authentication‑flow logic as a high‑priority control gap to prevent account takeover and downstream disruption.

Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue