CVE-2026-7397
Published:April 29, 2026
Updated:May 18, 2026
A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.9.0 is able to mitigate this issue. The patch is identified as 311dac197145e19e07df68feba2cd55d896a3cd1. Upgrading the affected component is recommended.
Affected Packages
https://github.com/NousResearch/hermes-agent.git (GITHUB):
Affected version(s) >=v2026.3.12 <v2026.4.13Fix Suggestion:
Update to version v2026.4.13Related Resources (8)
Do you need more information?
Contact UsCVSS v4
Base Score:
1.9
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
POC
CVSS v3
Base Score:
4.4
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
LOW
Exploit Maturity
PROOF-OF-CONCEPT
CVSS v2
Base Score:
3.2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
Exploitability
PROOF OF CONCEPT CODE
Weakness Type (CWE)
EPSS
Base Score:
0.01