CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-9354

CVE-2026-9354: Arbitrary Mass Mention Bypass in NousResearch hermes-agent Slack and Mattermost Adapters

Alon Barad
Alon Barad
Software Engineer

May 24, 2026·6 min read·13 visits

Executive Summary (TL;DR)

Unauthenticated prompt injection in hermes-agent Slack and Mattermost adapters allows attackers to trigger mass ping notifications via unescaped tags.

A vulnerability in the Slack and Mattermost platform adapters for NousResearch hermes-agent permits an unauthenticated remote attacker to execute arbitrary mass mentions. By leveraging prompt injection, an attacker can bypass output sanitization logic and trigger workspace-wide notification exhaustion.

Vulnerability Overview

The hermes-agent software facilitates communication between local Large Language Models and enterprise chat platforms. The agent operates platform-specific adapters to format and transmit LLM-generated output to Slack and Mattermost workspaces. Vulnerability CVE-2026-9354 exists within these adapters due to insufficient sanitization of platform-specific mention syntax.

The Slack adapter (gateway/platforms/slack.py) and the Mattermost adapter (gateway/platforms/mattermost.py) fail to neutralize mass-ping keywords. This failure allows the agent to issue workspace-wide notifications. The vulnerability is classified under CWE-116 (Improper Output Neutralization) for Slack and CWE-20 (Improper Input Validation) for Mattermost.

Unauthenticated remote attackers can exploit this via indirect prompt injection. By supplying malicious text that the LLM processes and outputs, the attacker coerces the agent into transmitting raw mass mentions. This mechanism triggers widespread notification exhaustion and disrupts workspace operations.

Root Cause Analysis

The vulnerability consists of two distinct implementation flaws across the platform adapters. The Slack adapter flaw originates from an overly permissive regular expression used during message formatting. The adapter attempts to protect valid Slack entities from subsequent formatting logic using a dedicated substitution function.

The regular expression re.sub(r'(<(?:[@#!]|(?:https?|mailto|tel):)[^>\n]+>)', ...) successfully matches valid user mentions and URLs. However, it also matches mass-ping tags such as <!everyone> and <!channel>. Because the matching logic protects these strings from sanitization, they are transmitted unaltered to the Slack API. The API processes the message with mrkdwn=True, executing the mass ping.

The Mattermost adapter vulnerability involves an omitted security configuration in the API payload construction. The adapter constructs a JSON payload for the /posts endpoint but fails to include the necessary properties to restrict bot mentions. The adapter code directly assigns the LLM output to the message field without establishing platform-specific guardrails.

Mattermost requires automated integrations to explicitly set the disable_mentions flag within the props object to suppress automated notifications. The hermes-agent implementation omits this property entirely. Consequently, the Mattermost server processes the LLM-generated @all string as a legitimate human-initiated workspace ping.

Code Analysis

The Slack adapter formatting logic requires structural changes to prevent mass-mention preservation. The current implementation uses a capture group that inadvertently matches the exclamation mark used in Slack broadcast mentions.

# Vulnerable Slack Regex in gateway/platforms/slack.py
re.sub(r'(<(?:[@#!]|(?:https?|mailto|tel):)[^>\n]+>)', ...)

The regex must be restricted to prevent matching broadcast directives. Alternatively, developers must implement a secondary sanitization pass that specifically neutralizes broadcast keywords after the initial parsing stage.

The Mattermost implementation requires a straightforward configuration patch. The vulnerable code constructs the outgoing message without the required restriction properties.

# Vulnerable Mattermost Payload in gateway/platforms/mattermost.py
payload = {
    "channel_id": channel_id,
    "message": content
}

The fix requires appending the props dictionary with disable_mentions set to True. This instructs the Mattermost server to render the @all string as plain text rather than an active notification.

# Mitigated Mattermost Payload
payload = {
    "channel_id": channel_id,
    "message": content,
    "props": {"disable_mentions": True}
}

The fundamental data flow and bypass mechanics are illustrated below.

Exploitation Mechanics

Exploitation relies on prompt injection methodologies. The attacker must control a portion of the input that the underlying LLM processes. This input is typically delivered via public channels, direct messages, or external data sources that the agent periodically ingests.

The attacker supplies a payload instructing the LLM to output specific strings. For Slack targets, the payload dictates the inclusion of the string literal <!everyone>. For Mattermost targets, the payload dictates the inclusion of the string literal @all.

A public Proof-of-Concept demonstrates the viability of this attack vector. The researcher verification script confirmed that the hermes-agent processes and transmits these strings without modification or filtering. The execution results in direct interaction with the chat platform's notification router.

The PoC execution log confirms the target platforms successfully parse and render the broadcast tags. The Mattermost server parsed @all due to the missing disable_mentions property. The Slack server executed <!everyone> due to the regular expression bypass protecting the raw tag.

Impact Assessment

The direct consequence of this vulnerability is a targeted notification exhaustion attack against enterprise environments. A single successful exploit triggers asynchronous alerts for every user within the workspace or channel. Repeated exploitation renders organizational communication platforms unusable.

The attack requires no authentication to the target chat platform. The attacker leverages the pre-existing API permissions granted to the hermes-agent integration. This access effectively bypasses internal network boundaries and platform access controls established by the organization.

The vulnerability carries a CVSS 4.0 score of 6.9, categorizing it as a medium severity flaw. The exploit requires low complexity and no user interaction, but the direct impact is limited to availability and systemic notification integrity.

As of the disclosure date, there is no evidence of active exploitation in the wild. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog.

Remediation Guidance

NousResearch has not released an official patch for version 2026.4.16. Organizations operating hermes-agent must implement manual source code workarounds to mitigate the vulnerability. Modifying the adapter source code is the primary immediate remediation strategy.

Administrators must update gateway/platforms/mattermost.py to include the disable_mentions property in the /posts JSON payload. This single configuration change completely eliminates the mass mention vector for Mattermost deployments.

Slack deployments require either regex modification or secondary sanitization within gateway/platforms/slack.py. Implementing a dedicated string replacement function to neutralize <!everyone> and <!channel> prior to API transmission provides reliable mitigation.

Organizations should also deploy LLM guardrails independently of the platform adapters. Output-filtering middleware that intercepts and inspects generated text adds defense-in-depth and prevents similar injection bypasses in future integration implementations.

Technical Appendix

CVSS Score
6.9/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P

Affected Systems

NousResearch hermes-agent <= 2026.4.16 (Slack Adapter)NousResearch hermes-agent <= 2026.4.16 (Mattermost Adapter)

Affected Versions Detail

Product
Affected Versions
Fixed Version
hermes-agent
NousResearch
<= 2026.4.16-
AttributeDetail
CWE IDCWE-116 / CWE-20
Attack VectorNetwork (Prompt Injection)
CVSS 4.06.9 (Medium)
CVSS 3.15.4 (Medium)
ImpactAvailability (Notification Exhaustion)
Exploit StatusPublic PoC Available
CISA KEVNot Listed

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1499Endpoint Denial of Service
Impact
CWE-116
Improper Encoding or Escaping of Output

Improper output escaping and missing security properties allow injection of raw broadcast notification tags.

Known Exploits & Detection

GitHub GistProof of Concept reproducing the mass ping bypass against Slack and Mattermost endpoints

Vulnerability Timeline

Vulnerability discovered and reported to NousResearch
2026-04-24
No vendor response received; researcher follow-up sent
2026-05-10
Public disclosure of CVE-2026-9354 and release of PoC
2026-05-24

References & Sources

  • [1]VulDB Entry for CVE-2026-9354
  • [2]CVE.org Record for CVE-2026-9354
  • [3]PoC Exploit Report
  • [4]hermes-agent Source Code Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.

More Reports

•about 11 hours ago•CVE-2026-9306
6.3

CVE-2026-9306: Unauthenticated Insecure Direct Object Reference (IDOR) in QuantumNous new-api Midjourney Relay

CVE-2026-9306 is a critical unauthenticated Insecure Direct Object Reference (IDOR) vulnerability located in the QuantumNous new-api application, affecting versions up to and including 0.12.1. The flaw is caused by improper middleware ordering combined with a lack of object-level authorization checks. This allows remote, unauthenticated attackers to retrieve sensitive Midjourney images belonging to other users by supplying a valid task identifier.

Amit Schendel
Amit Schendel
7 views•5 min read
•1 day ago•GHSA-GGXF-37HM-9WQF
6.5

GHSA-GGXF-37HM-9WQF: Session Leakage via Unsafe Challenge Path Parsing in instagrapi

The instagrapi library prior to version 2.6.9 contains an improper input validation vulnerability within its challenge handling mechanism. Maliciously crafted server responses can manipulate the client into forwarding session cookies and credentials to an external attacker-controlled domain.

Amit Schendel
Amit Schendel
7 views•6 min read
•1 day ago•GHSA-QQQM-5547-774X
9.1

GHSA-QQQM-5547-774X: Unauthenticated Path Traversal in FileBrowser Quantum PATCH Handler

GHSA-QQQM-5547-774X is a critical path traversal vulnerability in the FileBrowser Quantum application, specifically within the Go backend package. The vulnerability resides in the HTTP handler responsible for processing bulk file modifications via the public API. Unauthenticated attackers can exploit an order-of-operations flaw in the path sanitization logic to bypass intended directory restrictions. This allows adversaries to arbitrarily read, move, and overwrite files on the underlying filesystem by supplying specially crafted HTTP PATCH requests.

Alon Barad
Alon Barad
3 views•6 min read
•1 day ago•CVE-2026-8723
5.3

CVE-2026-8723: Synchronous Denial of Service in qs npm Package via TypeError

The qs query string parsing and serialization library for Node.js is vulnerable to a synchronous Denial of Service (DoS) attack. The vulnerability manifests as a process-terminating TypeError when processing arrays with null or undefined elements under specific configuration parameters.

Amit Schendel
Amit Schendel
17 views•7 min read
•1 day ago•GHSA-7M8F-HGJQ-8GC9
7.5

GHSA-7M8F-HGJQ-8GC9: Pre-Authentication Denial of Service via Insecure Deserialization Order in aiosend

The aiosend library prior to version 3.0.6 contains a pre-authentication Denial of Service (DoS) vulnerability in its webhook handling mechanism. The software processes and deserializes incoming JSON payloads before verifying the cryptographic signature, allowing unauthenticated attackers to exhaust server CPU and memory resources by sending large, complex payloads.

Amit Schendel
Amit Schendel
3 views•6 min read
•2 days ago•GHSA-JQQ5-8PX3-9M6M
6.2

GHSA-JQQ5-8PX3-9M6M: Single-Byte Heap Overflow Bypass in ImageMagick JSON and YAML Encoders

A heap-based buffer overflow vulnerability exists in the JSON and YAML encoders of ImageMagick and Magick.NET. This issue constitutes an incomplete fix for CVE-2026-40169, resulting in a single-byte out-of-bounds write (off-by-one error) during image metadata serialization.

Alon Barad
Alon Barad
4 views•6 min read