CVE-2026-22798

MEDIUM

Pypi Hermes < 0.9.1 - Log Information Exposure

Title source: rule
STIX 2.1

Description

hermes is an implementation of the HERMES workflow to automatize software publication with rich metadata. From 0.8.1 to before 0.9.1, hermes subcommands take arbitrary options under the -O argument. These have been logged in raw form. If users provide sensitive data such as API tokens (e.g., via hermes deposit -O invenio_rdm.auth_token SECRET), these are written to the log file in plain text, making them available to whoever can access the log file. This vulnerability is fixed in 0.9.1.

Scores

CVSS v3 5.9
EPSS 0.0001
EPSS Percentile 0.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-532
Status published
Products (2)
pypi/hermes 0.8.1 - 0.9.1PyPI
software-metadata.pub/hermes 0.8.1 - 0.9.1
Published Jan 12, 2026
Tracked Since Feb 18, 2026