CVE-2025-55751
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-22
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hackucf | onboardlite | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in OnboardLite allows an attacker to craft a link to the trusted application that, when visited by a user, redirects them to a malicious external site. This redirection can be used for phishing, credential theft, malware delivery, and abuse of user trust. Versions with commit hash 6cca19e or later have implemented JWT signing for the redirect URL parameter to mitigate this issue.
How can this vulnerability impact me? :
The vulnerability can lead to phishing attacks, theft of user credentials, delivery of malware, and abuse of the trust users place in the OnboardLite application. This can compromise user security and potentially lead to further exploitation of affected systems.