Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hkuds:openharness:*:*:*:*:*:*:*:* |
Thu, 16 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hkuds
Hkuds openharness |
|
| Vendors & Products |
Hkuds
Hkuds openharness |
Thu, 16 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote gateway users with chat access to invoke sensitive administrative commands by exploiting insufficient distinction between local-only and remote-safe commands in the gateway handler. Attackers can execute administrative commands such as /permissions full_auto through remote chat sessions to change permission modes of a running OpenHarness instance without operator authorization. | |
| Title | OpenHarness Remote Administrative Command Injection via Gateway Handler | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-16T14:19:24.128Z
Reserved: 2026-04-13T20:29:02.808Z
Link: CVE-2026-40502
Updated: 2026-04-16T14:19:18.926Z
Status : Analyzed
Published: 2026-04-16T01:16:11.250
Modified: 2026-04-23T19:48:16.540
Link: CVE-2026-40502
No data.
OpenCVE Enrichment
Updated: 2026-04-17T06:30:11Z