No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hkuds
Hkuds openharness |
|
| Vendors & Products |
Hkuds
Hkuds openharness |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system. | |
| Title | HKUDS OpenHarness Plugin Management Command Exposure | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-22T14:23:44.338Z
Reserved: 2026-04-21T19:22:21.465Z
Link: CVE-2026-6819
Updated: 2026-04-22T13:28:29.365Z
Status : Received
Published: 2026-04-21T20:17:05.780
Modified: 2026-04-22T14:17:07.063
Link: CVE-2026-6819
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:23Z