Логотип exploitDog
bind:CVE-2026-22798
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-22798

Количество 2

Количество 2

nvd логотип

CVE-2026-22798

7 дней назад

hermes is an implementation of the HERMES workflow to automatize software publication with rich metadata. From 0.8.1 to before 0.9.1, hermes subcommands take arbitrary options under the -O argument. These have been logged in raw form. If users provide sensitive data such as API tokens (e.g., via hermes deposit -O invenio_rdm.auth_token SECRET), these are written to the log file in plain text, making them available to whoever can access the log file. This vulnerability is fixed in 0.9.1.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-jm5j-jfrm-hm23

6 дней назад

hermes's raw options logging may disclose secrets passed in via subcommand options argument

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-22798

hermes is an implementation of the HERMES workflow to automatize software publication with rich metadata. From 0.8.1 to before 0.9.1, hermes subcommands take arbitrary options under the -O argument. These have been logged in raw form. If users provide sensitive data such as API tokens (e.g., via hermes deposit -O invenio_rdm.auth_token SECRET), these are written to the log file in plain text, making them available to whoever can access the log file. This vulnerability is fixed in 0.9.1.

CVSS3: 5.9
0%
Низкий
7 дней назад
github логотип
GHSA-jm5j-jfrm-hm23

hermes's raw options logging may disclose secrets passed in via subcommand options argument

CVSS3: 5.9
0%
Низкий
6 дней назад

Уязвимостей на страницу