Impact
OpenHarness versions before commit dd1d235450dd987b20bff01b7bfb02fe8620a0af contain a command‑injection flaw in the gateway handler. The handler cannot properly differentiate between local‑only and remote‑safe commands, allowing remote gateway users who have chat access to invoke privileged administrative commands such as "/permissions full_auto". This can change permission modes of a running OpenHarness instance without operator authorization, effectively giving the attacker elevated control.
Affected Systems
The affected product is OpenHarness from HKUDS. Any installation running a version prior to the commit dd1d235450dd987b20bff01b7bfb02fe8620a0af is vulnerable. No specific release numbers are listed, so all impacted instances should be considered until a patch is applied.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity. The EPSS score is less than 1%, suggesting a low probability of exploitation but still possible. Exploitation requires that an attacker possess remote gateway chat access, which is typically granted to authenticated users. While the attack surface is limited to environments that enable chat‑based gateway access, the impact of a successful exploit is significant because it allows alteration of system permissions and potentially broader administrative privileges.
OpenCVE Enrichment