Impact
A path traversal flaw exists in the wecom.py component of the WeChat Work Platform Adapter. The vulnerability is classified as CWE‑22 and permits a remote attacker to include arbitrary directory references in a request that are not properly sanitized, leading to unauthorized file disclosure or modification. The publicly available exploit demonstrates that the attack can be triggered from a remote location, potentially compromising sensitive data or executing arbitrary code.
Affected Systems
The flaw affects NousResearch hermes-agent version 0.8.0. The vulnerable functionality is located in the file gateway/platforms/wecom.py within the WeChat Work Platform Adapter submodule.
Risk and Exploitability
The CVSS score of 6.9 reflects a medium severity impact. EPSS information is missing, but the existence of a public exploit suggests a realistic risk of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable endpoint remotely; no special privileges or authentication are required as indicated by the publicly available proof‑of‑concept code. The potential outcome includes reading sensitive system files or injecting arbitrary code through the file system.
OpenCVE Enrichment