Medium severity6.5NVD Advisory· Published Apr 16, 2026· Updated Apr 23, 2026
CVE-2026-40503
CVE-2026-40503
Description
OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gateway users with chat access to read arbitrary files by supplying path traversal sequences to the /memory show slash command. Attackers can manipulate the path input parameter to escape the project memory directory and access sensitive files accessible to the OpenHarness process without filesystem containment validation.
Affected products
1Patches
1dd1d235450ddhttps://github.com/HKUDS/OpenHarnessvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/HKUDS/OpenHarness/commit/dd1d235450dd987b20bff01b7bfb02fe8620a0afnvdPatch
- github.com/HKUDS/OpenHarness/pull/127nvdExploitIssue Tracking
- www.vulncheck.com/advisories/openharness-path-traversal-information-disclosure-via-memory-shownvdThird Party Advisory
News mentions
0No linked articles in our index yet.