Home

Description

A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.9.0 is able to mitigate this issue. The patch is identified as 311dac197145e19e07df68feba2cd55d896a3cd1. Upgrading the affected component is recommended.

PUBLISHED Reserved 2026-04-29 | Published 2026-04-29 | Updated 2026-04-30 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 4.4CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C
3.2AV:L/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Symlink Following

Link Following

Product status

0.8.0
affected

0.9.0
unaffected

Timeline

2026-04-29:Advisory disclosed
2026-04-29:VulDB entry created
2026-04-29:VulDB entry last update

Credits

Yu_Bao (VulDB User) reporter

References

vuldb.com/vuln/360121 (VDB-360121 | NousResearch hermes-agent file_tools.py _check_sensitive_path symlink) vdb-entry technical-description

vuldb.com/vuln/360121/cti (VDB-360121 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/803270 (Submit #803270 | NousResearch hermes-agent 0.8.0 Path Write Protection Bypass) third-party-advisory

github.com/NousResearch/hermes-agent/issues/8734 exploit issue-tracking

github.com/NousResearch/hermes-agent/pull/8829 issue-tracking patch

github.com/...ommit/311dac197145e19e07df68feba2cd55d896a3cd1 patch

github.com/NousResearch/hermes-agent/releases/tag/v2026.4.13 patch

github.com/NousResearch/hermes-agent/ product

cve.org (CVE-2026-7397)

nvd.nist.gov (CVE-2026-7397)

Download JSON