← Volver a CVEs
CVE-2026-6819
HIGH8.8
Descripcion
HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado4/21/2026
Ultima modificacion4/22/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-276
Referencias
https://github.com/HKUDS/OpenHarness/commit/59017e09880fcf9a6f60456a84fb982900b2c0b2(disclosure@vulncheck.com)
https://github.com/HKUDS/OpenHarness/pull/156(disclosure@vulncheck.com)
https://github.com/HKUDS/OpenHarness/releases/tag/v0.1.7(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/hkuds-openharness-plugin-management-command-exposure(disclosure@vulncheck.com)
https://github.com/HKUDS/OpenHarness/pull/156(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.