radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

sourceThe Hacker News
calendar_todayApril 30, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Google Patches Critical RCE Vulnerability in Gemini CLI

Summary

Google has patched a critical security vulnerability in the Gemini CLI npm package and its associated GitHub Actions workflow. The flaw could have allowed attackers to execute arbitrary commands on affected systems.

Key Points

  • The vulnerability was found in the "@google/gemini-cli" npm package and "google-github-actions/run-gemini-cli" GitHub Actions workflow.
  • The flaw had a CVSS score of 10, indicating maximum severity.
  • It allowed unprivileged external attackers to load malicious content as Gemini configuration.
  • Google has addressed the issue to prevent potential exploitation.

Analysis

This vulnerability is significant due to its maximum CVSS score, which underscores the potential impact of remote code execution (RCE) on affected systems. The flaw's presence in widely-used tools like npm packages and GitHub Actions workflows highlights the importance of securing software supply chains and ensuring that dependencies are up-to-date and free from vulnerabilities.

Conclusion

IT professionals should immediately update their Gemini CLI installations and review their use of GitHub Actions workflows to ensure they are using the latest, patched versions. Regular audits of third-party packages and workflows are recommended to maintain security.