CVE-2026-6832
Severity CVSS v4.0:
HIGH
Type:
CWE-22
Path Traversal
Publication date:
21/04/2026
Last modified:
21/04/2026
Description
Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter. Attackers can exploit unvalidated session identifiers to construct paths that bypass the SESSION_DIR boundary and delete writable JSON files on the host system.
Impact
Base Score 4.0
7.20
Severity 4.0
HIGH
Base Score 3.x
8.10
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/nesquena/hermes-webui/commit/3cc5839bf303fa6758bfdac538507407a2929655
- https://github.com/nesquena/hermes-webui/pull/409
- https://github.com/nesquena/hermes-webui/pull/412
- https://github.com/nesquena/hermes-webui/releases/tag/v0.50.132
- https://github.com/nesquena/hermes-webui/releases/tag/v0.50.32
- https://www.vulncheck.com/advisories/nesquena-hermes-webui-arbitrary-file-deletion-via-unvalidated-session-id



