Loose Lips Sink Ships: How Hermes Logged Its Way into a Security Nightmare
Vulnerability ID: CVE-2026-22798
CVSS Score: 5.9
Published: 2026-01-13
The hermes software publication tool inadvertently logged sensitive command-line arguments, including API tokens and authentication secrets, to plaintext log files due to overzealous debug logging.
TL;DR
Developers often log too much in the name of debugging. In CVE-2026-22798, the hermes CLI tool dumped the entire argparse namespace into a log file. Since hermes allows passing secrets via the -O flag, this meant every API key used to publish software was written to disk in plaintext. If you share a machine or run this in CI/CD, your secrets are public property.
Technical Details
- CWE ID: CWE-532
- Attack Vector: Local (File Read)
- CVSS: 5.9 (Medium)
- EPSS Score: 0.00011 (Low)
- Impact: Credential Leak / Integrity Compromise
- Exploit Status: Trivial (Log Analysis)
Affected Systems
- hermes CLI tool (softwarepub)
-
hermes: >= 0.8.1, < 0.9.1 (Fixed in:
0.9.1)
Code Analysis
Commit: 90cb86a
Fix: mask sensitive option values in log output
- log.debug("Running hermes with the following command line arguments: %s", args)
+ log.debug("Running hermes with the following command line arguments: %s", mask_options_values(args))
Commit: 7f64f10
Introduction of the vulnerable logging logic
+ log.debug("Running hermes with the following command line arguments: %s", args)
Exploit Details
- N/A: Exploitation involves standard file access commands (grep, cat) on generated logs.
Mitigation Strategies
- Input Sanitization for Logs
- Principle of Least Privilege
- Secret Rotation
Remediation Steps:
- Upgrade
hermesto version 0.9.1 immediately. - Identify all systems (developer laptops, CI/CD runners) where
hermeswas executed. - Locate and securely delete
hermes.logfiles on these systems. - Revoke and rotate any API tokens (e.g., InvenioRDM, Zenodo) passed to the tool via the
-Oflag.
References
Read the full report for CVE-2026-22798 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)