CVE-2026-7551
Received Received - Intake
Remote Code Execution in HKUDS OpenHarness via Bridge Slash Command

Publication date: 2026-04-30

Last updated on: 2026-05-04

Assigner: VulnCheck

Description
HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with attacker-controlled command text that is forwarded to the bridge session manager and executed through the shared shell subprocess helper, allowing them to spawn shell sessions as the OpenHarness process user and access local files, credentials, workspace state, and repository contents.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hkuds openharness to 2026-04-27 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in HKUDS OpenHarness is a remote code execution flaw found in the /bridge slash command. It allows remote users, who are accepted by the system configuration, to execute arbitrary operating system commands. Attackers can use the /bridge spawn command with malicious command text that is forwarded to the bridge session manager and executed via a shared shell subprocess helper. This enables them to spawn shell sessions running as the OpenHarness process user.

Through this, attackers can gain access to local files, credentials, workspace state, and repository contents.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to execute arbitrary commands on the affected system remotely. This can lead to unauthorized access to sensitive data such as local files, credentials, workspace state, and repository contents.

Attackers gaining shell access as the OpenHarness process user can manipulate or steal data, disrupt operations, and potentially escalate privileges or move laterally within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart