Skip to content
CVSS 8.8 · HIGH

CVE-2026-7551

HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with attacker-controlled command text that is forwarded to the bridge session manager and executed through the shared shell subprocess helper, allowing them to spawn shell sessions as the OpenHarness process user and access local files, credentials, workspace state, and repository contents.

View on NVD

Analysis

OpenHarness is a specialized tool for AI-assisted software engineering research rather than a mainstream development framework or library. Although the vulnerability allows for remote code execution via command injection, its limited adoption in general production environments does not warrant an alert for the broader developer community.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0035 (0.3%)
Percentile: 57.3%
EPSS: 2026-05-06

Affects

hkuds:openharness

Technical description

HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with attacker-controlled command text that is forwarded to the bridge session manager and executed through the shared shell subprocess helper, allowing them to spawn shell sessions as the OpenHarness process user and access local files, credentials, workspace state, and repository contents.

Published: 4/30/2026, 10:16:27 PM
Last modified: 5/4/2026, 6:22:28 PM

References

HomeEventsBlogResourcesTeam