Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nesquena
Nesquena hermes-webui |
|
| Vendors & Products |
Nesquena
Nesquena hermes-webui |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | nesquena hermes-webui contains a trust-boundary failure vulnerability that allows authenticated attackers to set or change a session workspace to an arbitrary existing directory on disk by manipulating workspace path parameters in endpoints such as /api/session/new, /api/session/update, /api/chat/start, and /api/workspaces/add. Attackers can repoint a session workspace to a directory outside the intended trusted root and then use ordinary file read and write APIs to access or modify files outside the intended workspace boundary within the permissions of the hermes-webui process. | |
| Title | nesquena hermes-webui Arbitrary Workspace Directory Access | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-22T12:18:04.871Z
Reserved: 2026-04-21T20:58:02.047Z
Link: CVE-2026-6829
Updated: 2026-04-22T12:17:59.644Z
Status : Received
Published: 2026-04-21T22:16:20.690
Modified: 2026-04-21T22:16:20.690
Link: CVE-2026-6829
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:01Z