Description
A security flaw has been discovered in NousResearch hermes-agent up to 2026.4.16. This vulnerability affects the function _is_blocked_device of the file tools/file_tools.py of the component read_file Tool. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The _is_blocked_device function in the read_file tool of NousResearch hermes‑agent contains a classic path traversal weakness (CWE‑22). An attacker who can supply a manipulated file path can cause the agent to access and return data from files outside the intended directory. Because the flaw can be triggered via a remote request, the vulnerability enables remote reading of arbitrary files on the host, potentially exposing confidential information or configuration secrets.

Affected Systems

The vulnerability affects NousResearch hermes‑agent up to version 2026.4.16. No specific minor version details are listed, but any release equal to or earlier than 2026.4.16 is considered vulnerable. Users of newer releases are presumed unaffected unless otherwise noted by the vendor.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate risk level, and although the EPSS score is not available, a public exploit has already been released, indicating non‑negligible exploitation probability. The vulnerability is not listed in CISA KEV at present. Attackers can exploit it remotely by sending a crafted request to the read_file tool, enabling them to read arbitrary files on the underlying system and potentially use that access for further compromise.

Generated by OpenCVE AI on May 24, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade hermes‑agent to a patched version newer than 2026.4.16 if available.
  • Restrict access to the read_file module, enforcing strict path validation or disabling the feature when it is not required.
  • Implement network controls to limit who can communicate with the hermes‑agent instance, such as firewall rules or VPN access.
  • Monitor logs for attempted path traversal patterns related to the _is_blocked_device function.

Generated by OpenCVE AI on May 24, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in NousResearch hermes-agent up to 2026.4.16. This vulnerability affects the function _is_blocked_device of the file tools/file_tools.py of the component read_file Tool. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title NousResearch hermes-agent read_file Tool file_tools.py _is_blocked_device path traversal
First Time appeared Nousresearch
Nousresearch hermes-agent
Weaknesses CWE-22
CPEs cpe:2.3:a:nousresearch:hermes-agent:*:*:*:*:*:*:*:*
Vendors & Products Nousresearch
Nousresearch hermes-agent
References
Metrics cvssV2_0

{'score': 6.4, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Nousresearch Hermes-agent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T03:15:10.604Z

Reserved: 2026-05-23T09:19:32.925Z

Link: CVE-2026-9351

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T04:30:34Z

Weaknesses