Impact
The flaw lies in the _discover_dashboard_plugins function of hermes_cli/web_server.py; a manipulated HERMES_ENABLE_PROJECT_PLUGINS argument triggers an incorrect comparison, potentially allowing an attacker to enable plugins that should be disabled. This miscomparison can lead to unauthorized code execution or privilege escalation on the local host, as the affected system can load and run malicious plugins. The vulnerability relies on local access to affect the environment, and its exploitation requires the attacker already have a foothold on the target machine.
Affected Systems
The vulnerability affects NousResearch Hermes Agent version 2026.4.23 in the CLI web-dashboard component. No other versions or products are listed as affected.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate severity. The EPSS score is not available, but the exploit has already been released publicly, suggesting that a determined attacker could use it. The issue is not listed in the CISA KEV catalog, but because the flaw requires local access and the vendor has not responded, the risk remains significant for systems that have not yet applied a patch or update.
OpenCVE Enrichment