High severity8.2NVD Advisory· Published Apr 21, 2026· Updated May 7, 2026
CVE-2026-6823
CVE-2026-6823
Description
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/HKUDS/OpenHarness/commit/fab40c6eabfb15f2bdf23cddd3cfe66a64ea203dnvdPatch
- github.com/HKUDS/OpenHarness/pull/147nvdExploitIssue TrackingPatch
- www.vulncheck.com/advisories/hkuds-openharness-insecure-default-remote-channel-allowlistnvdThird Party Advisory
- github.com/HKUDS/OpenHarness/releases/tag/v0.1.7nvdRelease Notes
News mentions
0No linked articles in our index yet.