Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Resolves Critical Security Flaws in Gemini CLI Tools

Google Resolves Critical Security Flaws in Gemini CLI Tools

Posted on April 30, 2026 By CWS

Google has recently tackled a significant security vulnerability affecting its Gemini CLI tools, including the ‘@google/gemini-cli’ npm package and the ‘google-github-actions/run-gemini-cli’ GitHub Actions workflow. This flaw, rated with a maximum CVSS score of 10.0, posed a critical risk by allowing attackers to execute arbitrary commands on host systems. The discovery was made by Novee Security, which highlighted the potential for malicious content to override Gemini configurations, leading to direct command execution on affected systems.

Understanding the Vulnerability

The security flaw, which lacks a CVE identifier, impacted several versions of the Gemini CLI. Specifically, it affected ‘@google/gemini-cli’ versions below 0.39.1 and 0.40.0-preview.3, as well as ‘google-github-actions/run-gemini-cli’ versions below 0.1.22. Google emphasized that the risk was primarily associated with workflows utilizing the Gemini CLI in headless mode. In such scenarios, the tool could automatically trust workspace folders, leading to potential exploitation in environments processing untrusted inputs, such as user-submitted pull requests.

The vulnerability stemmed from the automatic trust of current workspace folders, which allowed the tool to load any agent configuration without user consent. This behavior could be exploited by attackers planting specially crafted configurations, thereby facilitating remote code execution on the system hosting the agent.

Mitigation Strategies and Updates

To counteract the vulnerability, Google has implemented a requirement for folders to be explicitly trusted before their configurations can be accessed. The tech giant advises users to revise their workflows accordingly. For workflows operating on trusted inputs, users are instructed to set ‘GEMINI_TRUST_WORKSPACE: true’. In cases involving untrusted inputs, Google’s guidance recommends hardening the workflow against malicious content by setting specific environment variables.

Further, Google is enhancing its tool allowlisting processes when Gemini CLI is run in ‘–yolo mode’. This is to prevent remote code execution in scenarios involving untrusted inputs, such as user-submitted GitHub issues. The policy changes aim to ensure safe command execution while processing untrusted inputs, though some workflows may require adjustment to accommodate these new policies.

Additional Security Challenges

In addition to the Gemini CLI issue, Novee Security has identified a high-severity vulnerability in the AI-driven development tool, Cursor. This vulnerability, present in versions prior to 2.5, has a CVSS score of 8.1 and could lead to arbitrary code execution via prompt injection. Exploitation occurs through a sandbox escape mechanism in Git configurations, enabling malicious Git hooks to execute automatically during commit operations.

Moreover, a further vulnerability, dubbed CursorJacking, was disclosed by LayerX, revealing a high-severity access control issue that exposes sensitive API keys and credentials. This flaw could allow unauthorized access and data theft through rogue extensions, emphasizing the need for users to only download trusted extensions to mitigate risks.

These findings underscore the importance of stringent security measures and regular updates to safeguard against evolving cybersecurity threats. By addressing these vulnerabilities, Google and other stakeholders aim to enhance the security of development environments and maintain the integrity of software supply chains.

The Hacker News Tags:CI/CD, code execution, Cybersecurity, Gemini CLI, GitHub actions, Google, Security, software updates, Vulnerabilities

Post navigation

Previous Post: Cursor AI Vulnerability Risks Developer Credentials
Next Post: EtherRAT Malware Targets Windows via Trojanized Installer

Related Posts

Fortinet Addresses Critical FortiClient EMS Vulnerability Fortinet Addresses Critical FortiClient EMS Vulnerability The Hacker News
DarkSword iOS Kit Exploits Multiple Flaws for Device Control DarkSword iOS Kit Exploits Multiple Flaws for Device Control The Hacker News
LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing The Hacker News
INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled The Hacker News
EC-Council Boosts AI Workforce with New Certifications EC-Council Boosts AI Workforce with New Certifications The Hacker News
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst
  • Ransomware Attack Exposes Data of 170,000 at Sandhills Medical
  • AI-Driven Code Attack Targets Crypto Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst
  • Ransomware Attack Exposes Data of 170,000 at Sandhills Medical
  • AI-Driven Code Attack Targets Crypto Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark