Description
A vulnerability was determined in NousResearch hermes-agent up to 5157f5427f19488b31c6fdebbacd15d798ce7f63. This affects the function detect_dangerous_command of the file tools/approval.py of the component terminal_tool. This manipulation causes os command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 6.9 Medium
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the detect_dangerous_command function of terminal_tool within the NousResearch hermes-agent. The function incorrectly handles user-supplied input, allowing an attacker to inject arbitrary OS commands, which may compromise confidentiality, integrity, or availability. The flaw carries a CVSS score of 6.9, indicating a moderate severity, and the exploit has been publicly disclosed and may be used by attackers.

Affected Systems

Affected systems include all installations of NousResearch hermes-agent up to and including the commit identifier 5157f5427f19488b31c6fdebbacd15d798ce7f63. The entry point for exploitation is the detect_dangerous_command function within tools/approval.py of the terminal_tool component.

Risk and Exploitability

The CVSS score of 6.9 reflects moderate risk, and the EPSS score is 1%. The vulnerability is not listed in the CISA KEV catalog, yet its remote nature and public disclosure make exploitation feasible from outside the system. Attackers may craft input to trigger arbitrary command execution, therefore remediation is strongly advised to prevent potential compromise.

Generated by OpenCVE AI on May 24, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update hermes-agent to a revision newer than 5157f5427f19488b31c6fdebbacd15d798ce7f63 to apply the vendor‑provided fix.
  • If an update is not yet available, restrict network access to the hermes-agent process and disable the terminal_tool component until a patch is applied.
  • Implement input validation for the detect_dangerous_command function to reject or sanitize any shell metacharacters, mitigating command injection until an official patch is released.
  • Monitor system logs for unexpected OS command executions and apply least‑privilege principles to the hermes-agent process.

Generated by OpenCVE AI on May 24, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in NousResearch hermes-agent up to 5157f5427f19488b31c6fdebbacd15d798ce7f63. This affects the function detect_dangerous_command of the file tools/approval.py of the component terminal_tool. This manipulation causes os command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title NousResearch hermes-agent terminal_tool approval.py detect_dangerous_command os command injection
First Time appeared Nousresearch
Nousresearch hermes-agent
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:nousresearch:hermes-agent:*:*:*:*:*:*:*:*
Vendors & Products Nousresearch
Nousresearch hermes-agent
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Nousresearch Hermes-agent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T08:30:10.795Z

Reserved: 2026-05-23T10:33:13.039Z

Link: CVE-2026-9367

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T10:30:15Z

Weaknesses