Impact
The flaw resides in the _make_run_env function of the local.py module within the Messaging Gateway Handler of NousResearch hermes-agent. By feeding crafted input to this function, an attacker can cause sensitive data to be leaked. The exposed data may include host configuration, credentials or other confidential material, raising the risk of data compromise. The weakness is classified as Information Exposure (CWE-200) and an improper authorization issue (CWE-284).
Affected Systems
All releases of NousResearch hermes-agent up to version 2026.4.23 are affected. Users of any earlier release within this range are potentially vulnerable unless they have applied a later fix.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity impact. EPSS is not available, so the likelihood of exploitation remains uncertain, and the vulnerability is not listed in the CISA KEV catalog. The advisory states that the flaw can be exploited remotely; the likely attack vector is via a network-facing interface or management console that invokes the Messaging Gateway Handler. Since an exploit has already been released publicly, the risk to exposed systems is high. The vendor has not responded, implying that a patch may not yet be available.
OpenCVE Enrichment