CVE-2025-55751
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-08-22

Assigner: GitHub, Inc.

Description
OnboardLite is the result of the Influx Initiative, our vision for an improved student organization lifecycle at the University of Central Florida. An attacker can craft a link to the trusted application that, when visited, redirects the user to a malicious external site. This enables phishing, credential theft, malware delivery, and trust abuse. Any version with commit hash 6cca19e or later implements jwt signing for the redirect url parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-08-22
Generated
2026-05-07
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hackucf onboardlite *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in OnboardLite allows an attacker to craft a link to the trusted application that, when visited by a user, redirects them to a malicious external site. This redirection can be used for phishing, credential theft, malware delivery, and abuse of user trust. Versions with commit hash 6cca19e or later have implemented JWT signing for the redirect URL parameter to mitigate this issue.


How can this vulnerability impact me? :

The vulnerability can lead to phishing attacks, theft of user credentials, delivery of malware, and abuse of the trust users place in the OnboardLite application. This can compromise user security and potentially lead to further exploitation of affected systems.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart