Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
EXECUTIVE SUMMARY
Google Patches Critical RCE Vulnerability in Gemini CLI
Summary
Google has patched a critical security vulnerability in the Gemini CLI npm package and its associated GitHub Actions workflow. The flaw could have allowed attackers to execute arbitrary commands on affected systems.
Key Points
- The vulnerability was found in the "@google/gemini-cli" npm package and "google-github-actions/run-gemini-cli" GitHub Actions workflow.
- The flaw had a CVSS score of 10, indicating maximum severity.
- It allowed unprivileged external attackers to load malicious content as Gemini configuration.
- Google has addressed the issue to prevent potential exploitation.
Analysis
This vulnerability is significant due to its maximum CVSS score, which underscores the potential impact of remote code execution (RCE) on affected systems. The flaw's presence in widely-used tools like npm packages and GitHub Actions workflows highlights the importance of securing software supply chains and ensuring that dependencies are up-to-date and free from vulnerabilities.
Conclusion
IT professionals should immediately update their Gemini CLI installations and review their use of GitHub Actions workflows to ensure they are using the latest, patched versions. Regular audits of third-party packages and workflows are recommended to maintain security.