Home

Description

hermes is an implementation of the HERMES workflow to automatize software publication with rich metadata. From 0.8.1 to before 0.9.1, hermes subcommands take arbitrary options under the -O argument. These have been logged in raw form. If users provide sensitive data such as API tokens (e.g., via hermes deposit -O invenio_rdm.auth_token SECRET), these are written to the log file in plain text, making them available to whoever can access the log file. This vulnerability is fixed in 0.9.1.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-12 | Updated 2026-01-13 | Assigner GitHub_M




MEDIUM: 5.9CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

>= 0.8.1, < 0.9.1
affected

References

github.com/...hermes/security/advisories/GHSA-jm5j-jfrm-hm23

github.com/...ommit/7f64f102e916c76dc44404b77ab2a80f5a4e59b1

github.com/...ommit/90cb86acd026e7841f2539ae7a1b284a7f263514

cve.org (CVE-2026-22798)

nvd.nist.gov (CVE-2026-22798)

Download JSON