EUVD-2026-23450

| CVE-2026-40515 HIGH
2026-04-17 VulnCheck
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 17, 2026 - 17:22 vuln.today
cvss_changed
CVSS Changed
Apr 17, 2026 - 17:22 NVD
7.5 (HIGH) 8.7 (HIGH)
Analysis Generated
Apr 17, 2026 - 17:03 vuln.today

DescriptionNVD

OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tools with sensitive root directories that are not properly evaluated against configured path rules, allowing disclosure of sensitive local file content, key material, configuration files, or directory contents despite configured path restrictions.

AnalysisAI

Remote unauthenticated attackers can bypass path restrictions in OpenHarness (pre-commit bd4df81) to read arbitrary sensitive files via crafted grep/glob operations. The incomplete path normalization in permission checking allows exploitation of built-in tools to access sensitive root directories, key material, and configuration files despite configured access controls. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: identify all systems running OpenHarness and assess current version against commit bd4df81. Within 7 days: apply vendor patch by updating to the patched version incorporating commit bd4df81 across all affected deployments. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23450 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy