HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.
References
Configurations
No configuration.
History
22 Apr 2026, 14:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/HKUDS/OpenHarness/pull/147 - |
21 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 21:16
Updated : 2026-04-22 21:23
NVD link : CVE-2026-6823
Mitre link : CVE-2026-6823
CVE.ORG link : CVE-2026-6823
JSON object : View
Products Affected
No product.
CWE
CWE-276
Incorrect Default Permissions
