Description
OnboardLite is a comprehensive membership lifecycle platform built for student organizations at the University of Central Florida. Versions of the software prior to commit 1d32081a66f21bcf41df1ecb672490b13f6e429f have a stored cross-site scripting vulnerability that can be rendered to an admin when they attempt to migrate a user's discord account in the dashboard. Commit 1d32081a66f21bcf41df1ecb672490b13f6e429f patches the issue.
Published: 2026-01-19
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting that permits administrator account takeover
Action: Immediate Patch
AI Analysis

Impact

OnboardLite contains a stored cross‑site scripting flaw that is triggered when an administrator migrates a student’s Discord account in the dashboard. The attacker can inject malicious JavaScript that is stored and later executed with the full privileges of the administrator, enabling account hijacking, credential theft, or arbitrary code execution within the application context. The weakness stems from a lack of input validation (CWE‑79), improper handling of user‑supplied data (CWE‑20), and potential data type mismatch (CWE‑116).

Affected Systems

All releases of HackUCF OnboardLite prior to commit 1d32081a66f21bcf41df1ecb672490b13f6e429f are affected. The vulnerability was fixed in that commit, which should be applied to replace any earlier version of the software.

Risk and Exploitability

The CVSS score of 7.3 indicates high severity, but the EPSS score less than 1% and absence from the CISA KEV catalog suggest a low likelihood of widespread exploitation at present. The likely attack vector is via the web interface that allows administrators to migrate Discord accounts; an attacker must be able to supply or modify the migration field with a malicious payload, which persists and executes when the administrator reloads the dashboard. An attacker would need any level of access that permits the execution of the migration action, such as user accounts with compromised credentials or access to an unprotected administrator account.

Generated by OpenCVE AI on April 18, 2026 at 15:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the patched version of OnboardLite by applying commit 1d32081a66f21bcf41df1ecb672490b13f6e429f or a later release that includes the fix.
  • If a patch cannot be applied immediately, disable the Discord account migration feature or restrict its use to trusted administrators until the vulnerability is remediated.
  • Implement comprehensive input validation and output encoding on all user‑supplied data, or deploy a web application firewall to block XSS payloads.

Generated by OpenCVE AI on April 18, 2026 at 15:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Hackucf
Hackucf onboardlite
Vendors & Products Hackucf
Hackucf onboardlite

Mon, 19 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
Description OnboardLite is a comprehensive membership lifecycle platform built for student organizations at the University of Central Florida. Versions of the software prior to commit 1d32081a66f21bcf41df1ecb672490b13f6e429f have a stored cross-site scripting vulnerability that can be rendered to an admin when they attempt to migrate a user's discord account in the dashboard. Commit 1d32081a66f21bcf41df1ecb672490b13f6e429f patches the issue.
Title OnboardLite has stored Cross-site Scripting issue that may lead to admin Account Take Over
Weaknesses CWE-116
CWE-20
CWE-79
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Hackucf Onboardlite
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T15:12:32.529Z

Reserved: 2026-01-16T21:02:02.900Z

Link: CVE-2026-23880

cve-icon Vulnrichment

Updated: 2026-01-20T15:12:27.548Z

cve-icon NVD

Status : Deferred

Published: 2026-01-19T21:15:52.357

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses