Home

Description

OpenHarness prior to commit 166fcfe contains an improper access control vulnerability in built-in file tools due to inconsistent parameter handling in permission enforcement, allowing attackers who can influence agent tool execution to read arbitrary local files outside the intended repository scope. Attackers can exploit the path parameter not being passed to the PermissionChecker in read_file, write_file, edit_file, and notebook_edit tools to bypass deny rules and access sensitive files such as configuration files, credentials, and SSH material, or create and overwrite files in restricted host paths in full_auto mode.

PUBLISHED Reserved 2026-01-08 | Published 2026-04-07 | Updated 2026-04-09 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

Any version before 166fcfefb7614dbac51bd061f56542725b0298e9
affected

Credits

Chia Min Jun Lennon finder

References

github.com/HKUDS/OpenHarness/pull/32 issue-tracking

github.com/...ommit/166fcfefb7614dbac51bd061f56542725b0298e9 patch

www.vulncheck.com/...-improper-access-control-via-file-tools third-party-advisory

cve.org (CVE-2026-22682)

nvd.nist.gov (CVE-2026-22682)

Download JSON