CVE-2026-6823 PUBLISHED

HKUDS OpenHarness Insecure Default Remote Channel Allowlist

Assigner: VulnCheck
Reserved: 21.04.2026 Published: 21.04.2026 Updated: 21.04.2026

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.3

Product Status

Vendor HKUDS
Product OpenHarness
Versions Default: unaffected
  • affected from 0 to PR #147 (excl.)

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • CWE-276 Incorrect Default Permissions CWE