CVE-2026-23880

7.3 HIGH

📋 TL;DR

OnboardLite versions before commit 1d32081a66f21bcf41df1ecb672490b13f6e429f contain a stored cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts into the admin dashboard. When an admin attempts to migrate a user's Discord account, the malicious script executes in the admin's browser context. This affects all users running vulnerable versions of OnboardLite.

💻 Affected Systems

Products:
  • OnboardLite
Versions: All versions prior to commit 1d32081a66f21bcf41df1ecb672490b13f6e429f
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the Discord account migration functionality of the admin dashboard.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal admin session cookies, perform actions as the admin (like modifying user data or system settings), or redirect to phishing sites.

🟠

Likely Case

Attackers could hijack admin sessions to access sensitive user information or perform unauthorized administrative actions.

🟢

If Mitigated

With proper input validation and output encoding, the malicious script would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have some level of access to inject malicious payloads, and then an admin must trigger the vulnerable functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 1d32081a66f21bcf41df1ecb672490b13f6e429f

Vendor Advisory: https://github.com/HackUCF/OnboardLite/security/advisories/GHSA-93w8-83cg-h89g

Restart Required: Yes

Instructions:

1. Pull the latest code from the repository. 2. Ensure commit 1d32081a66f21bcf41df1ecb672490b13f6e429f is applied. 3. Restart the OnboardLite application.

🔧 Temporary Workarounds

Disable Discord Account Migration

all

Temporarily disable the Discord account migration feature in the admin dashboard to prevent exploitation.

Implement Content Security Policy (CSP)

all

Add a strict Content Security Policy header to prevent execution of inline scripts.

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in Discord migration requests.
  • Restrict admin dashboard access to trusted IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Check if your OnboardLite installation includes commit 1d32081a66f21bcf41df1ecb672490b13f6e429f. If not, you are vulnerable.

Check Version:

git log --oneline | head -1

Verify Fix Applied:

After applying the patch, test the Discord account migration functionality with a benign XSS payload (e.g., <script>alert('test')</script>) to ensure it's properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual or malformed input in Discord migration API requests
  • Admin session cookies being accessed from unexpected IP addresses

Network Indicators:

  • HTTP requests containing script tags or JavaScript code in Discord migration parameters

SIEM Query:

source="web_logs" AND (url_path="/admin/discord-migration" AND (request_body LIKE "%<script>%" OR request_body LIKE "%javascript:%"))

🔗 References

📤 Share & Export