CVE-2026-40515: CWE-863 Incorrect Authorization in HKUDS OpenHarness
CVE-2026-40515 is a high-severity permission bypass vulnerability in HKUDS OpenHarness before commit bd4df81. It arises from incomplete path normalization in the permission checker, allowing attackers to bypass configured path restrictions. Exploitation enables unauthorized reading of sensitive local files, including key material and configuration files, by invoking built-in grep and glob tools with root directories that are not properly validated.
AI Analysis
Technical Summary
The vulnerability in HKUDS OpenHarness (prior to commit bd4df81) is due to incorrect authorization (CWE-863) caused by incomplete path normalization in the permission checking mechanism. This flaw allows attackers to bypass intended path restrictions and access sensitive files by leveraging the built-in grep and glob tools with root directories that the system fails to properly evaluate against configured path rules. As a result, attackers can disclose sensitive local file contents, including key material and configuration files, despite existing path restrictions.
Potential Impact
Successful exploitation can lead to unauthorized disclosure of sensitive local files, including key material and configuration files, which may compromise system confidentiality and security. The vulnerability does not require privileges, user interaction, or special attack complexity, increasing its risk. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vulnerability is fixed starting from commit bd4df81, upgrading to this or a later version is recommended once official patches or updates are released. Until then, restrict access to vulnerable versions and monitor for updates from the vendor.
CVE-2026-40515: CWE-863 Incorrect Authorization in HKUDS OpenHarness
Description
CVE-2026-40515 is a high-severity permission bypass vulnerability in HKUDS OpenHarness before commit bd4df81. It arises from incomplete path normalization in the permission checker, allowing attackers to bypass configured path restrictions. Exploitation enables unauthorized reading of sensitive local files, including key material and configuration files, by invoking built-in grep and glob tools with root directories that are not properly validated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in HKUDS OpenHarness (prior to commit bd4df81) is due to incorrect authorization (CWE-863) caused by incomplete path normalization in the permission checking mechanism. This flaw allows attackers to bypass intended path restrictions and access sensitive files by leveraging the built-in grep and glob tools with root directories that the system fails to properly evaluate against configured path rules. As a result, attackers can disclose sensitive local file contents, including key material and configuration files, despite existing path restrictions.
Potential Impact
Successful exploitation can lead to unauthorized disclosure of sensitive local files, including key material and configuration files, which may compromise system confidentiality and security. The vulnerability does not require privileges, user interaction, or special attack complexity, increasing its risk. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vulnerability is fixed starting from commit bd4df81, upgrading to this or a later version is recommended once official patches or updates are released. Until then, restrict access to vulnerable versions and monitor for updates from the vendor.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-04-13T20:29:02.809Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e25e76bdfbbecc595f3fba
Added to database: 4/17/2026, 4:23:18 PM
Last enriched: 4/17/2026, 4:38:14 PM
Last updated: 4/17/2026, 5:33:45 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.