Home

Description

HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system.

PUBLISHED Reserved 2026-04-21 | Published 2026-04-21 | Updated 2026-04-22 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-276 Incorrect Default Permissions

Product status

Default status
unaffected

Any version before PR #156
affected

Credits

Chia Min Jun Lennon finder

References

github.com/HKUDS/OpenHarness/pull/156 exploit

github.com/HKUDS/OpenHarness/pull/156 (Pull Request) patch

github.com/...ommit/59017e09880fcf9a6f60456a84fb982900b2c0b2 (Patch Commit)

github.com/HKUDS/OpenHarness/releases/tag/v0.1.7 (Release Notes)

www.vulncheck.com/...ness-plugin-management-command-exposure third-party-advisory

cve.org (CVE-2026-6819)

nvd.nist.gov (CVE-2026-6819)

Download JSON