CVE-2026-6823
HKUDS OpenHarness Insecure Default Remote Channel Allowlist
CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.
| CWE | CWE-276 |
| Vendor | hkuds |
| Product | openharness |
| Published | Apr 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for hkuds openharness
Be the first to know when new high vulnerabilities affecting hkuds openharness are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
Affected Versions
HKUDS / OpenHarness
0 < PR #147
References
github.com: https://github.com/HKUDS/OpenHarness/pull/147 github.com: https://github.com/HKUDS/OpenHarness/commit/fab40c6eabfb15f2bdf23cddd3cfe66a64ea203d github.com: https://github.com/HKUDS/OpenHarness/releases/tag/v0.1.7 vulncheck.com: https://www.vulncheck.com/advisories/hkuds-openharness-insecure-default-remote-channel-allowlist
Credits
Chia Min Jun Lennon