๐Ÿ” CVE Alert

CVE-2026-22677

MEDIUM 6.5

Hermes WebUI < 0.51.44 - Release T Path Traversal via Session Import Endpoint

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

Hermes WebUI prior to 0.51.44 - Release T contains a path traversal vulnerability in the session import endpoint that allows authenticated attackers to read arbitrary files by importing a crafted session with an unrestricted workspace value. Attackers can supply a blocked filesystem root in the workspace field and subsequently use relative paths in the session file API to access any file readable by the WebUI process.

CWE CWE-22
Vendor nesquena
Product hermes-webui
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for nesquena hermes-webui

Be the first to know when new medium vulnerabilities affecting nesquena hermes-webui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

nesquena / hermes-webui
0 < 0.51.44

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nesquena/hermes-webui/releases/tag/v0.51.44 github.com: https://github.com/nesquena/hermes-webui/pull/2048 github.com: https://github.com/nesquena/hermes-webui/commit/f00cb74f776f22f02f5eb6b39dfb389f87cc7fd3 vulncheck.com: https://www.vulncheck.com/advisories/hermes-webui-path-traversal-via-session-import-endpoint

Credits

Chia Min Jun Lennon