CVE-2026-40503 PUBLISHED

OpenHarness Path Traversal Information Disclosure via /memory show

Assigner: VulnCheck
Reserved: 13.04.2026 Published: 16.04.2026 Updated: 16.04.2026

OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gateway users with chat access to read arbitrary files by supplying path traversal sequences to the /memory show slash command. Attackers can manipulate the path input parameter to escape the project memory directory and access sensitive files accessible to the OpenHarness process without filesystem containment validation.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor HKUDS
Product OpenHarness
Versions Default: unaffected
  • affected from 0 to dd1d235450dd987b20bff01b7bfb02fe8620a0af (excl.)

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE