CVE-2026-22677 PUBLISHED

Hermes WebUI < 0.51.44 - Release T Path Traversal via Session Import Endpoint

Assigner: VulnCheck
Reserved: 08.01.2026 Published: 13.05.2026 Updated: 13.05.2026

Hermes WebUI prior to 0.51.44 - Release T contains a path traversal vulnerability in the session import endpoint that allows authenticated attackers to read arbitrary files by importing a crafted session with an unrestricted workspace value. Attackers can supply a blocked filesystem root in the workspace field and subsequently use relative paths in the session file API to access any file readable by the WebUI process.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6

Product Status

Vendor nesquena
Product hermes-webui
Versions Default: affected
  • affected from 0 to 0.51.44 (excl.)
  • Version f00cb74f776f22f02f5eb6b39dfb389f87cc7fd3 is unaffected

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE