{"id":23111,"date":"2026-04-30T14:29:10","date_gmt":"2026-04-30T14:29:10","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/23111\/"},"modified":"2026-04-30T14:29:10","modified_gmt":"2026-04-30T14:29:10","slug":"google-gemini-cli-flaw-enables-command-execution-on-hosts-systems","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/23111\/","title":{"rendered":"Google Gemini CLI Flaw Enables Command Execution on Hosts systems"},"content":{"rendered":"<p>A maximum-severity remote code execution (RCE) vulnerability in Google Gemini CLI has been disclosed by Novee Security, allowing unauthenticated external attackers to execute arbitrary commands directly on host systems, turning CI\/CD pipelines into viable supply-chain attack vectors.<\/p>\n<p>Google assigned the flaw a CVSS score of 10.0, the highest possible rating, underscoring the critical nature of the issue.<\/p>\n<p>Security researcher <a href=\"https:\/\/cyberpress.org\/gemini-cli-vulnerability-2\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Elad Meged and the Novee Security team<\/a> discovered the vulnerability in both the\u00a0@google\/gemini-cli\u00a0package and the\u00a0google-github-actions\/run-gemini-cli\u00a0GitHub Action. <\/p>\n<p>When processed by Gemini CLI in non-interactive environments, such as automated CI\/CD jobs, the tool implicitly trusts and executes this configuration resulting in remote code execution on the host system.<\/p>\n<p>Google Gemini CLI Vulnerability<\/p>\n<p>The vulnerability stems from Gemini CLI\u2019s handling of workspace trust in headless environments. In these scenarios, the tool automatically loads configuration files from the working directory without validation or user approval.<\/p>\n<p>An attacker can exploit this behavior by submitting a malicious pull request containing crafted configuration files.<\/p>\n<p>Once the <a href=\"https:\/\/cyberpress.org\/ci-cd-pipelines-a-prime-target-for-threat-actors\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CI\/CD workflow<\/a> runs, the Gemini CLI treats attacker-controlled content as trusted configuration. This triggers command execution on the host system before any sandbox protections are applied.<\/p>\n<p>Notably, this attack does not rely on prompt injection or manipulation of AI model behavior. Instead, it operates at the infrastructure level, bypassing the AI decision-making process entirely.<\/p>\n<p>The execution happened at the infrastructure layer, entirely bypassing the AI system\u2019s reasoning and safety mechanisms.<\/p>\n<p>Every\u00a0google-github-actions\/run-gemini-cli\u00a0GitHub Action workflow below the patched versions was affected. Successful exploitation gave an unprivileged external attacker code execution on the CI\/CD runner, granting access to:<\/p>\n<p>Repository source code and build artifacts<\/p>\n<p>Secrets and credentials stored in the workflow environment<\/p>\n<p>Cloud service tokens with downstream access<\/p>\n<p>Lateral movement paths into connected production systems<\/p>\n<p>Patches Released<\/p>\n<p>Google released patches addressing the vulnerability in:<\/p>\n<p>@google\/gemini-cli\u00a0versions\u00a00.39.1\u00a0and\u00a00.40.0-preview.3<\/p>\n<p>google-github-actions\/run-gemini-cli\u00a0version\u00a00.1.22<\/p>\n<p>Organizations using any earlier version of these packages in CI\/CD workflows should upgrade immediately and audit workflow logs for signs of unexpected configuration file loading or anomalous command execution.<\/p>\n<p>This vulnerability arrives amid accelerating software supply chain attacks, including the\u00a0<a href=\"https:\/\/cyberpress.org\/axios-npm-packages-compromised\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">axios npm package hijack<\/a> (March 2026), the\u00a0<a href=\"https:\/\/cyberpress.org\/shai-hulud-2-0-malware-breach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Shai-Hulud self-replicating worm<\/a> (2025), the\u00a0<a href=\"https:\/\/cyberpress.org\/xz-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">XZ Utils backdoor<\/a> (2024), and the\u00a0Polyfill.io CDN hijack (2024).<\/p>\n<p>AI coding agents now sit inside those same pipelines, <a href=\"https:\/\/novee.security\/blog\/google-gemini-cli-rce-vulnerability-cvss-10-critical-security-advisory\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">according to Noovee Security<\/a>, holding the execution privileges of trusted contributors and reading from the same workspaces developers touch.<\/p>\n<p>AI safety reviews probe model behavior. None of these tools evaluate how all layers, prompts, files, configuration, CI\/CD runners, cloud credentials, and host environments interact when an external attacker actively manipulates inputs.<\/p>\n<p>Security teams should treat AI agents running in CI\/CD pipelines\u00a0as privileged infrastructure components, subject to the same scrutiny as any other trusted build system. <\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 87%,rgb(169,184,195) 100%)\">Follow us on\u00a0<a href=\"https:\/\/news.google.com\/publications\/CAAqKQgKIiNDQklTRkFnTWFoQUtEbU41WW1WeWNISmxjM011YjNKbktBQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google News<\/a>\u00a0,\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/cyberpress-org\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>\u00a0and\u00a0<a href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">X<\/a>\u00a0to Get More Instant Updates.\u00a0Set Cyberpress as a Preferred Source in\u00a0<a href=\"https:\/\/www.google.com\/preferences\/source?q=cyberpress.org\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"A maximum-severity remote code execution (RCE) vulnerability in Google Gemini CLI has been disclosed by Novee Security, allowing&hellip;\n","protected":false},"author":2,"featured_media":23112,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[9644,2408,132,1430,10718],"class_list":{"0":"post-23111","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-google","8":"tag-cyber-security-news","9":"tag-gemini","10":"tag-google","11":"tag-google-gemini","12":"tag-vulnerability"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/23111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=23111"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/23111\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/23112"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=23111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=23111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=23111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}