CVE-2026-22677
Hermes WebUI < 0.51.44 - Release T Path Traversal via Session Import Endpoint
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
Hermes WebUI prior to 0.51.44 - Release T contains a path traversal vulnerability in the session import endpoint that allows authenticated attackers to read arbitrary files by importing a crafted session with an unrestricted workspace value. Attackers can supply a blocked filesystem root in the workspace field and subsequently use relative paths in the session file API to access any file readable by the WebUI process.
| CWE | CWE-22 |
| Vendor | nesquena |
| Product | hermes-webui |
| Published | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for nesquena hermes-webui
Be the first to know when new medium vulnerabilities affecting nesquena hermes-webui are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
nesquena / hermes-webui
0 < 0.51.44
References
github.com: https://github.com/nesquena/hermes-webui/releases/tag/v0.51.44 github.com: https://github.com/nesquena/hermes-webui/pull/2048 github.com: https://github.com/nesquena/hermes-webui/commit/f00cb74f776f22f02f5eb6b39dfb389f87cc7fd3 vulncheck.com: https://www.vulncheck.com/advisories/hermes-webui-path-traversal-via-session-import-endpoint
Credits
Chia Min Jun Lennon