Vulnerability Description
HKUDS OpenHarness prior to PR #159 remediation contains a session key derivation vulnerability that allows authenticated participants in shared chats or threads to hijack other users' sessions by exploiting a shared ohmo session key that lacks sender identity verification. Attackers can reuse another user's conversation state and replace or interrupt their active tasks by colliding into the same session boundary through the shared chat or thread scope.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hkuds | Openharness | < 0.1.7 |
Related Weaknesses (CWE)
References
- https://github.com/HKUDS/OpenHarness/commit/3186851c479ee714a9bb9aa6cd77017db7e5Patch
- https://github.com/HKUDS/OpenHarness/pull/159ExploitIssue Tracking
- https://www.vulncheck.com/advisories/hkuds-openharness-session-key-collision-priThird Party Advisory
- https://github.com/HKUDS/OpenHarness/pull/159ExploitIssue Tracking
FAQ
What is CVE-2026-6729?
CVE-2026-6729 is a vulnerability with a CVSS score of 6.3 (MEDIUM). HKUDS OpenHarness prior to PR #159 remediation contains a session key derivation vulnerability that allows authenticated participants in shared chats or threads to hijack other users' sessions by expl...
How severe is CVE-2026-6729?
CVE-2026-6729 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6729?
Check the references section above for vendor advisories and patch information. Affected products include: Hkuds Openharness.