Impact
The _is_blocked_device function in the read_file tool of NousResearch hermes‑agent contains a classic path traversal weakness (CWE‑22). An attacker who can supply a manipulated file path can cause the agent to access and return data from files outside the intended directory. Because the flaw can be triggered via a remote request, the vulnerability enables remote reading of arbitrary files on the host, potentially exposing confidential information or configuration secrets.
Affected Systems
The vulnerability affects NousResearch hermes‑agent up to version 2026.4.16. No specific minor version details are listed, but any release equal to or earlier than 2026.4.16 is considered vulnerable. Users of newer releases are presumed unaffected unless otherwise noted by the vendor.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate risk level, and although the EPSS score is not available, a public exploit has already been released, indicating non‑negligible exploitation probability. The vulnerability is not listed in CISA KEV at present. Attackers can exploit it remotely by sending a crafted request to the read_file tool, enabling them to read arbitrary files on the underlying system and potentially use that access for further compromise.
OpenCVE Enrichment