Impact
The vulnerability arises in the check_all_command_guards function of the Batch Runner's tools/approval.py module. By manipulating the input to this function, an attacker can bypass the required authorization checks, allowing execution of privileged commands or actions without proper permission. This results in unauthorized privileged operations, representing a breach of confidentiality and integrity and is classified under CWE-862 and CWE-863.
Affected Systems
Versions of NousResearch hermes-agent up to and including 2026.4.16 are affected. The flaw specifically targets the Batch Runner component of the Hermes-Agent product suite.
Risk and Exploitability
With a CVSS score of 6.9 the vulnerability is considered moderate in severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation is possible remotely, and the exploit code is publicly available, indicating a realistic threat surface. Attackers with remote network access to the Hermes-Agent service could exploit the lack of proper authorization to gain elevated privileges or bypass controls.
OpenCVE Enrichment