Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems

Posted on July 29, 2025July 29, 2025 By CWS

A important safety vulnerability found in Google’s Gemini CLI device allowed attackers to execute arbitrary malicious instructions on developer methods with out detection. 

The vulnerability, recognized by cybersecurity agency Tracebit on June 27, 2025, exploited a mixture of immediate injection strategies, insufficient enter validation, and deceptive consumer interface components to realize silent code execution when builders inspected untrusted code repositories.

Key Takeaways1. Gemini CLI allowed silent malicious code execution on developer methods.2. Immediate injection tricked customers into whitelisting instructions, enabling credential theft.3. Improve to v0.1.14+ instantly and use sandboxing.

Exploitation Mechanism By Immediate Injection

The vulnerability centered on Gemini CLI’s run_shell_command device and its assist for context recordsdata, sometimes named GEMINI.md, which offer project-specific data to the AI assistant. 

Attackers may embed malicious directions inside seemingly benign recordsdata like README.md, usually disguised inside professional content material such because the GNU Public License textual content.

The assault employed a complicated two-stage method. First, attackers would immediate Gemini to request execution of an innocuous command like grep ^Setup README.md to seek for setup directions.

Exploitation Mechanism

When customers authorised this delicate operation and added it to their session whitelist, the system’s flawed validation logic created a gap for exploitation.

The core technical flaw resided in Gemini CLI’s insufficient command validation when evaluating shell inputs in opposition to the whitelist. 

The unique implementation didn’t accurately parse advanced shell command strings, permitting attackers to append malicious payloads after authorised instructions. 

As an illustration, a whitelisted grep command might be exploited utilizing the next command.

Command for execution

This command would execute usually as a grep operation whereas concurrently exfiltrating all surroundings variables, doubtlessly containing delicate credentials, to an attacker-controlled server, reads the advisory.

Shell Set up

Silent Execution and Detection Evasion

The vulnerability’s most harmful facet was its potential to stay utterly hidden from customers.

Researchers exploited Gemini CLI’s Terminal Consumer Interface rendering quirks by inserting massive numbers of whitespace characters inside instructions, thereby obscuring malicious payloads from show. 

This meant that whereas the malicious code executed efficiently, customers would solely see the benign portion of the command of their interface.

Google labeled this as a P1/S1 severity difficulty and launched a repair in Gemini CLI model 0.1.14 on July 25, 2025. 

The patch improved command parsing logic and made malicious instructions extra seen to customers, requiring specific approval for extra binaries. 

Safety researchers advocate that builders instantly improve to model 0.1.14 or later and make the most of sandboxing modes each time potential when utilizing AI-powered growth instruments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:CLI, Commands, Developer, Execute, Gemini, Hackers, Malicious, Systems, Vulnerability

Post navigation

Previous Post: Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT
Next Post: PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site

Related Posts

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
  • Threat Actors Allegedly Claim Access to Nokia’s Internal Network
  • FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
  • Palo Alto Networks to Acquire CyberArk in $25 Billion Deal
  • 5 Email Attacks SOCs Cannot Detect Without A Sandbox 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
  • Threat Actors Allegedly Claim Access to Nokia’s Internal Network
  • FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
  • Palo Alto Networks to Acquire CyberArk in $25 Billion Deal
  • 5 Email Attacks SOCs Cannot Detect Without A Sandbox 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News