Platform
linux
Component
openharness
Fixed in
bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae
CVE-2026-40515 describes a permission bypass vulnerability discovered in OpenHarness prior to commit bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae. This flaw allows attackers to circumvent path restrictions and read sensitive files on the system. The vulnerability stems from incomplete path normalization within the permission checker, enabling the invocation of tools like grep and glob with unauthorized access. A fix has been released in version bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae.
The primary impact of CVE-2026-40515 is the unauthorized disclosure of sensitive files. An attacker exploiting this vulnerability can bypass configured path restrictions and execute tools like grep and glob with access to root directories that should be protected. This could lead to the exposure of configuration files, key material (e.g., API keys, passwords), and other sensitive data stored locally. The blast radius depends on the sensitivity of the files accessible within the root directories. While the vulnerability doesn't directly lead to remote code execution, the compromised data could be leveraged for further attacks, such as credential theft or privilege escalation if sensitive credentials are exposed. The incomplete path normalization resembles weaknesses seen in other privilege escalation scenarios where path traversal vulnerabilities are exploited.
CVE-2026-40515 was publicly disclosed on 2026-04-17. There is no indication of this vulnerability being added to the CISA KEV catalog (as of the disclosure date). No public proof-of-concept exploits have been published at this time, but the vulnerability's nature suggests it could be relatively easy to exploit once a suitable exploit is developed. The vulnerability's impact on data confidentiality warrants careful monitoring.
Exploit Status
EPSS
0.04% (12% percentile)
CISA SSVC
CVSS Vector
The recommended mitigation for CVE-2026-40515 is to immediately upgrade OpenHarness to version bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae or later. If upgrading is not immediately feasible, consider implementing stricter path restrictions within the OpenHarness configuration to limit the scope of potential file access. While not a direct mitigation, reviewing and hardening the permissions of sensitive files and directories can reduce the potential impact of a successful exploit. There are no specific WAF or proxy rules that can directly address this vulnerability, as it resides within the application's logic. After upgrading, verify the fix by attempting to execute grep or glob commands with unauthorized paths to ensure the permission checks are functioning correctly.
Update OpenHarness to the patched version (commit bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae) to mitigate the permission bypass vulnerability. This update addresses the incomplete path normalization in the permission checker, preventing the disclosure of sensitive files.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-40515 is a vulnerability in OpenHarness versions 0.0.0–bd4df81 that allows attackers to bypass path restrictions and read sensitive files due to incomplete path normalization.
You are affected if you are using OpenHarness versions between 0.0.0 and bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae. Check your version and upgrade immediately.
Upgrade OpenHarness to version bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae or later. If immediate upgrade is not possible, implement stricter path restrictions.
There is currently no confirmed active exploitation of CVE-2026-40515, but the vulnerability's nature suggests it could be exploited once a suitable exploit is developed.
Refer to the OpenHarness project's official security advisories and release notes for the latest information regarding CVE-2026-40515.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.