๐Ÿ” CVE Alert

CVE-2026-6823

HIGH 8.2

HKUDS OpenHarness Insecure Default Remote Channel Allowlist

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.

CWE CWE-276
Vendor hkuds
Product openharness
Published Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for hkuds openharness

Be the first to know when new high vulnerabilities affecting hkuds openharness are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

HKUDS / OpenHarness
0 < PR #147

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/HKUDS/OpenHarness/pull/147 github.com: https://github.com/HKUDS/OpenHarness/commit/fab40c6eabfb15f2bdf23cddd3cfe66a64ea203d github.com: https://github.com/HKUDS/OpenHarness/releases/tag/v0.1.7 vulncheck.com: https://www.vulncheck.com/advisories/hkuds-openharness-insecure-default-remote-channel-allowlist

Credits

Chia Min Jun Lennon