๐Ÿ” CVE Alert

CVE-2026-6729

MEDIUM 6.3

HKUDS OpenHarness Session Key Collision Privilege Escalation

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

HKUDS OpenHarness prior to PR #159 remediation contains a session key derivation vulnerability that allows authenticated participants in shared chats or threads to hijack other users' sessions by exploiting a shared ohmo session key that lacks sender identity verification. Attackers can reuse another user's conversation state and replace or interrupt their active tasks by colliding into the same session boundary through the shared chat or thread scope.

CWE CWE-287
Vendor hkuds
Product openharness
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for hkuds openharness

Be the first to know when new medium vulnerabilities affecting hkuds openharness are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

HKUDS / OpenHarness
0 < PR #159

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/HKUDS/OpenHarness/pull/159 github.com: https://github.com/HKUDS/OpenHarness/commit/3186851c479ee714a9bb9aa6cd77017db7e589e2 vulncheck.com: https://www.vulncheck.com/advisories/hkuds-openharness-session-key-collision-privilege-escalation

Credits

Chia Min Jun Lennon