Description
A vulnerability was identified in NousResearch hermes-agent 0.8.0. Affected by this issue is some unknown functionality of the file gateway/platforms/wecom.py of the component WeChat Work Platform Adapter. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Published: 2026-04-29
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A path traversal flaw exists in the wecom.py component of the WeChat Work Platform Adapter. The vulnerability is classified as CWE‑22 and permits a remote attacker to include arbitrary directory references in a request that are not properly sanitized, leading to unauthorized file disclosure or modification. The publicly available exploit demonstrates that the attack can be triggered from a remote location, potentially compromising sensitive data or executing arbitrary code.

Affected Systems

The flaw affects NousResearch hermes-agent version 0.8.0. The vulnerable functionality is located in the file gateway/platforms/wecom.py within the WeChat Work Platform Adapter submodule.

Risk and Exploitability

The CVSS score of 6.9 reflects a medium severity impact. EPSS information is missing, but the existence of a public exploit suggests a realistic risk of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable endpoint remotely; no special privileges or authentication are required as indicated by the publicly available proof‑of‑concept code. The potential outcome includes reading sensitive system files or injecting arbitrary code through the file system.

Generated by OpenCVE AI on April 29, 2026 at 21:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed version of NousResearch hermes-agent that removes the path traversal vulnerability (any release after 0.8.0).
  • Ensure that all file path inputs received by wecom.py are sanitized and validated against a whitelist of allowed directories, rejecting any relative or absolute paths that escape the intended sandbox.
  • Limit external exposure of the WeChat Work Platform Adapter by restricting its network binding to internal interfaces or enforcing strict firewall rules so that only trusted systems can contact it.

Generated by OpenCVE AI on April 29, 2026 at 21:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Nousresearch
Nousresearch hermes-agent
Vendors & Products Nousresearch
Nousresearch hermes-agent

Wed, 29 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in NousResearch hermes-agent 0.8.0. Affected by this issue is some unknown functionality of the file gateway/platforms/wecom.py of the component WeChat Work Platform Adapter. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Title NousResearch hermes-agent WeChat Work Platform Adapter wecom.py path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Nousresearch Hermes-agent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T19:28:34.807Z

Reserved: 2026-04-29T10:44:06.942Z

Link: CVE-2026-7396

cve-icon Vulnrichment

Updated: 2026-04-29T19:28:30.358Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T18:16:05.567

Modified: 2026-04-29T21:16:21.590

Link: CVE-2026-7396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:15:16Z

Weaknesses