CVE-2026-6829 PUBLISHED

nesquena hermes-webui Arbitrary Workspace Directory Access

Assigner: VulnCheck
Reserved: 21.04.2026 Published: 21.04.2026 Updated: 21.04.2026

nesquena hermes-webui contains a trust-boundary failure vulnerability that allows authenticated attackers to set or change a session workspace to an arbitrary existing directory on disk by manipulating workspace path parameters in endpoints such as /api/session/new, /api/session/update, /api/chat/start, and /api/workspaces/add. Attackers can repoint a session workspace to a directory outside the intended trusted root and then use ordinary file read and write APIs to access or modify files outside the intended workspace boundary within the permissions of the hermes-webui process.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor nesquena
Product hermes-webui
Versions Default: unaffected
  • affected from 0 to PR #416 (excl.)

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE