CVE-2026-40503

| EUVD-2026-23143 HIGH
2026-04-16 VulnCheck
7.1
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

5
Analysis Updated
Apr 16, 2026 - 01:45 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 16, 2026 - 01:38 vuln.today
cvss_changed
Severity Changed
Apr 16, 2026 - 01:38 NVD
MEDIUM HIGH
CVSS Changed
Apr 16, 2026 - 01:38 NVD
6.5 (MEDIUM) 7.1 (HIGH)
Analysis Generated
Apr 16, 2026 - 01:19 vuln.today

DescriptionNVD

OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gateway users with chat access to read arbitrary files by supplying path traversal sequences to the /memory show slash command. Attackers can manipulate the path input parameter to escape the project memory directory and access sensitive files accessible to the OpenHarness process without filesystem containment validation.

AnalysisAI

Path traversal in OpenHarness allows authenticated gateway users with chat access to read arbitrary files on the server via the '/memory show' slash command. Affecting all versions prior to commit dd1d235, attackers can inject directory traversal sequences to escape the project memory directory and access any file readable by the OpenHarness process. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: identify all OpenHarness deployments in your environment and document current versions. Within 7 days: apply vendor patch by updating to commit dd1d235450dd987b20bff01b7bfb02fe8620a0af or later, and audit gateway user access controls to restrict chat permissions to only required personnel. …

Sign in for detailed remediation steps.

Share

CVE-2026-40503 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy