CVE-2026-22798

hermes is an implementation of the HERMES workflow to automatize software publication with rich metadata. From 0.8.1 to before 0.9.1, hermes subcommands take arbitrary options under the -O argument. These have been logged in raw form. If users provide sensitive data such as API tokens (e.g., via hermes deposit -O invenio_rdm.auth_token SECRET), these are written to the log file in plain text, making them available to whoever can access the log file. This vulnerability is fixed in 0.9.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:software-metadata.pub:hermes:*:*:*:*:*:python:*:*

History

08 Mar 2026, 02:03

Type Values Removed Values Added
CPE cpe:2.3:a:software-metadata.pub:hermes:*:*:*:*:*:python:*:*
First Time Software-metadata.pub hermes
Software-metadata.pub
References () https://github.com/softwarepub/hermes/commit/7f64f102e916c76dc44404b77ab2a80f5a4e59b1 - () https://github.com/softwarepub/hermes/commit/7f64f102e916c76dc44404b77ab2a80f5a4e59b1 - Patch
References () https://github.com/softwarepub/hermes/commit/90cb86acd026e7841f2539ae7a1b284a7f263514 - () https://github.com/softwarepub/hermes/commit/90cb86acd026e7841f2539ae7a1b284a7f263514 - Patch
References () https://github.com/softwarepub/hermes/security/advisories/GHSA-jm5j-jfrm-hm23 - () https://github.com/softwarepub/hermes/security/advisories/GHSA-jm5j-jfrm-hm23 - Patch, Vendor Advisory

12 Jan 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-12 22:16

Updated : 2026-03-08 02:03


NVD link : CVE-2026-22798

Mitre link : CVE-2026-22798

CVE.ORG link : CVE-2026-22798


JSON object : View

Products Affected

software-metadata.pub

  • hermes
CWE
CWE-532

Insertion of Sensitive Information into Log File