CVE-2026-7113 Overview
A missing authentication vulnerability has been identified in NousResearch hermes-agent version 0.8.0. The vulnerability exists in the file gateway/platforms/webhook.py within the Webhooks Endpoint component. By manipulating the _INSECURE_NO_AUTH argument, an attacker can bypass authentication controls entirely, potentially gaining unauthorized access to the webhook functionality.
Critical Impact
Remote attackers can bypass authentication on the Webhooks Endpoint, potentially allowing unauthorized access to agent functionality and data manipulation capabilities.
Affected Products
- NousResearch hermes-agent 0.8.0
- Webhooks Endpoint component (gateway/platforms/webhook.py)
Discovery Timeline
- 2026-04-27 - CVE CVE-2026-7113 published to NVD
- 2026-04-29 - Last updated in NVD database
Technical Details for CVE-2026-7113
Vulnerability Analysis
This vulnerability falls under CWE-287 (Improper Authentication), which occurs when software fails to properly verify the identity of actors attempting to access resources. In hermes-agent, the webhook endpoint implementation includes an _INSECURE_NO_AUTH argument that, when manipulated, allows attackers to circumvent authentication mechanisms entirely.
The exploit has been disclosed publicly through a GitHub Issue #6440 on Hermes and a corresponding GitHub Pull Request #6445 was submitted to address the issue. However, the project maintainers have not yet responded to these notifications.
While this attack requires network access, it is classified as having high complexity, meaning successful exploitation requires specific conditions to be met. The difficult nature of exploitation and the limited impact scope contribute to the lower severity rating.
Root Cause
The root cause of this vulnerability is improper authentication handling in the webhook endpoint implementation. The _INSECURE_NO_AUTH parameter appears to be a development or testing flag that was not properly secured in production code. This allows attackers to manipulate this argument to disable authentication checks, effectively bypassing security controls designed to protect the webhook functionality.
Attack Vector
The attack can be launched remotely over the network against the Webhooks Endpoint. An attacker would need to identify an exposed hermes-agent instance and craft requests that manipulate the _INSECURE_NO_AUTH argument in gateway/platforms/webhook.py. While the attack complexity is high and exploitation is considered difficult, the public disclosure of exploit details increases the risk for unpatched systems.
The vulnerability mechanism involves authentication bypass through parameter manipulation. Technical details are available in the GitHub Issue #6440 on Hermes and the proposed fix can be reviewed in the associated GitHub Pull Request #6445.
Detection Methods for CVE-2026-7113
Indicators of Compromise
- Unexpected or unauthorized requests to webhook endpoints without valid authentication credentials
- Requests containing manipulated _INSECURE_NO_AUTH parameter values
- Unusual traffic patterns to gateway/platforms/webhook.py endpoint
- Authentication bypass attempts in application logs
Detection Strategies
- Monitor hermes-agent logs for authentication failures or bypass attempts on webhook endpoints
- Implement network traffic analysis to detect requests targeting the webhook component with suspicious parameters
- Deploy application-layer firewall rules to detect and block requests attempting to manipulate authentication parameters
- Audit access logs for unauthorized webhook invocations
Monitoring Recommendations
- Enable verbose logging for the hermes-agent webhook component to capture authentication events
- Set up alerting for any requests that bypass normal authentication flows
- Regularly review access logs for the gateway/platforms/webhook.py endpoint
- Monitor for any public exploitation activity through threat intelligence feeds referencing VulDB Vulnerability #359713
How to Mitigate CVE-2026-7113
Immediate Actions Required
- Review your hermes-agent deployment to determine if webhook functionality is exposed to untrusted networks
- Implement network-level access controls to restrict access to the webhook endpoint
- Apply the proposed fix from GitHub Pull Request #6445 if an official patch is not yet available
- Consider disabling webhook functionality if not required for operations
Patch Information
As of the last update (2026-04-29), the NousResearch team has not released an official patch for this vulnerability. A community-submitted fix is available via GitHub Pull Request #6445. Organizations should monitor the GitHub Repository: Hermes Agent for official security updates.
Workarounds
- Restrict network access to hermes-agent webhook endpoints using firewall rules or network segmentation
- Deploy a reverse proxy with authentication in front of the webhook endpoint
- Remove or disable the _INSECURE_NO_AUTH functionality if modifying source code is feasible
- Implement IP allowlisting to limit webhook access to trusted sources only
# Example: Restrict access to webhook endpoint using iptables
# Allow only trusted IP ranges to access hermes-agent webhook port
iptables -A INPUT -p tcp --dport 8080 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


