Description
A vulnerability was detected in NousResearch hermes-agent up to 2026.4.16. The affected element is an unknown function of the component Slack Agent/Mattermost Agent. The manipulation of the argument format_message results in escaping of output. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is located in the Slack Agent/Mattermost Agent component of NousResearch hermes‑agent. An attacker can manipulate the format_message argument to alter the output escaping logic, enabling the injection of arbitrary content. This defect, listed as CWE-116 (Improper Encoding of Output) and CWE-74 (Improper Validation of Input), could allow execution of malicious scripts or commands within the messaging environment, potentially resulting in remote code execution or unauthorized actions. The exploit is remote, publicly available, and can be triggered by any entity that can send a crafted format_message request.

Affected Systems

Affected vendor: NousResearch; product: hermes‑agent; all releases up to and including 2026.4.16 are vulnerable. The flaw resides in the component responsible for handling Slack and Mattermost messages and applies to any platform or operating system where this agent is deployed.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. No EPSS score is provided, and the vulnerability is not listed in the CISA KEV catalog, though the exploit is publicly shared. Exploitation requires remote access to the format_message functionality and can be carried out by sending a crafted request. The lack of a KEV listing does not negate the risk; the public nature of the exploit suggests a non‑negligible likelihood of targeted attacks against unpatched installations.

Generated by OpenCVE AI on May 24, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NousResearch hermes‑agent to a version newer than 2026.4.16.
  • If an upgrade is not feasible, disable or remove the Slack Agent/Mattermost Agent component entirely.
  • Implement strict input validation or sanitization on the format_message argument to ensure proper escaping before processing.
  • Monitor logs for anomalous message formatting that may indicate attempted exploitation.

Generated by OpenCVE AI on May 24, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in NousResearch hermes-agent up to 2026.4.16. The affected element is an unknown function of the component Slack Agent/Mattermost Agent. The manipulation of the argument format_message results in escaping of output. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title NousResearch hermes-agent Slack Agent/Mattermost Agent escape output
First Time appeared Nousresearch
Nousresearch hermes-agent
Weaknesses CWE-116
CWE-74
CPEs cpe:2.3:a:nousresearch:hermes-agent:*:*:*:*:*:*:*:*
Vendors & Products Nousresearch
Nousresearch hermes-agent
References
Metrics cvssV2_0

{'score': 6.4, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Nousresearch Hermes-agent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T04:15:07.598Z

Reserved: 2026-05-23T09:19:41.024Z

Link: CVE-2026-9354

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T08:00:10Z

Weaknesses