Home

Description

HKUDS OpenHarness prior to PR #159 remediation contains a session key derivation vulnerability that allows authenticated participants in shared chats or threads to hijack other users' sessions by exploiting a shared ohmo session key that lacks sender identity verification. Attackers can reuse another user's conversation state and replace or interrupt their active tasks by colliding into the same session boundary through the shared chat or thread scope.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-20 | Updated 2026-04-21 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

Improper Authentication (CWE-287)

Product status

Default status
unaffected

Any version before PR #159
affected

Credits

Chia Min Jun Lennon finder

References

github.com/HKUDS/OpenHarness/pull/159 exploit

github.com/HKUDS/OpenHarness/pull/159 patch

github.com/...ommit/3186851c479ee714a9bb9aa6cd77017db7e589e2 patch

www.vulncheck.com/...sion-key-collision-privilege-escalation third-party-advisory

cve.org (CVE-2026-6729)

nvd.nist.gov (CVE-2026-6729)

Download JSON