• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Allow Code Execution

Admin by Admin
April 30, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Google has addressed a most severity safety flaw in Gemini CLI — the “@google/gemini-cli” npm bundle and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that might have allowed attackers to execute arbitrary instructions on host techniques.

“The vulnerability allowed an unprivileged exterior attacker to pressure their very own malicious content material to load as Gemini configuration,” Novee Safety mentioned in a Wednesday report. “This triggered command execution straight on the host system, bypassing safety earlier than the agent’s sandbox even initialized.”

The shortcoming, which doesn’t have a CVE identifier, carries a CVSS rating of 10.0. It impacts the next variations –

  • @google/gemini-cli < 0.39.1
  • @google/gemini-cli < 0.40.0-preview.3
  • google-github-actions/run-gemini-cli < 0.1.22

In its advisory revealed final week, Google mentioned the influence is restricted to workflows utilizing Gemini CLI in headless mode, including that any use of the software in headless mode with out folder belief would require guide evaluation to configure this belief mechanism.

“In earlier variations, Gemini CLI working in CI environments (headless mode) routinely trusted workspace folders for the aim of loading configuration and surroundings variables,” it mentioned.

“That is probably dangerous in conditions the place Gemini CLI runs on untrusted folders in headless mode (e.g., CI workflows that evaluation user-submitted pull requests). If used with untrusted listing contents, this might result in distant code execution through malicious surroundings variables within the native .gemini/ listing.”

This computerized belief of the present workspace folder meant that the software might load any agent configuration it discovered with out evaluation, sandboxing, or express person consent. An attacker might weaponize this habits by planting a specifically crafted configuration that might pave the way in which for code execution on the host working the agent, successfully turning CI/CD pipelines into supply-chain assault paths.

The replace addresses the issue by requiring folders to be explicitly trusted earlier than configuration information could be accessed. To that finish, customers are being urged to evaluation their workflows and undertake considered one of two approaches –

  • If the workflow runs on trusted inputs (e.g., reviewing pull requests from trusted collaborators), set GEMINI_TRUST_WORKSPACE: ‘true’ within the workflow.
  • If the workflow runs on untrusted inputs, evaluation Google’s steerage in google-github-actions/run-gemini-cli to harden the workflow towards malicious content material, and set the surroundings variable.

The tech big additionally famous that it is taking steps to harden software allowlisting when Gemini CLI is configured to run in –yolo mode to stop eventualities the place untrusted inputs (e.g., user-submitted GitHub points) might result in distant code execution through immediate injection by profiting from the truth that the auto-approve mode would ignore any allowlist in “~/.gemini/settings.json” and run all software calls routinely (together with “run_shell_command”) with out requiring person affirmation.

“In model 0.39.1, the Gemini CLI coverage engine now evaluates software allowlisting beneath –yolo mode, which is helpful for CI workflows that allowlist a couple of secure instructions to run when processing untrusted inputs,” Google mentioned. “Consequently, some workflows that beforehand trusted this habits might fail silently until software allowlists are modified to suit the duty.”

Cursor Bug Results in Code Execution

The disclosure comes as Novee Safety additionally highlighted a high-severity vulnerability within the AI-powered growth software Cursor previous to model 2.5 (CVE-2026-26268, CVSS rating: 8.1) that might additionally result in arbitrary code execution by way of a immediate injection.

Cursor, in an alert launched in February 2026, described it as a case of sandbox escape by means of .git configurations, permitting a rogue agent to arrange a naked repository (“.git”) with a malicious Git hook that is routinely fired each time a commit operation runs inside the embedded repository context with out requiring any person interplay.

The top result’s auto-approved arbitrary code execution on the sufferer’s machine by means of the next sequence of actions –

  • Consumer clones a public GitHub repository with the embedded naked repository containing a malicious post-checkout hook
  • Consumer opens the repository in CursorIDE
  • Customers ask an innocuous immediate to “clarify the codebase”
  • Cursor agent parses the AGENTS.md that instructs it to navigate to the naked repository and performs a “git checkout” of the grasp department
  • The post-checkout hook contained in the naked repository is triggered, resulting in code execution.

“The basis trigger isn’t a flaw in Cursor’s core product logic, however slightly a consequence of a function interplay in Git, one which turns into exploitable the second an AI agent begins autonomously executing Git operations inside a repository it would not management,” safety researcher Assaf Levkovich mentioned.

“When the agent runs git checkout as a part of fulfilling a routine request, it isn’t doing something the person did not implicitly authorize. However neither the person nor the agent has visibility into what the repository’s Cursor Guidelines have set in movement. A malicious pre-commit hook embedded in a nested naked repository executes silently, outdoors the agent’s reasoning chain and outdoors the person’s area of view.”

The findings additionally coincide with the invention of one other high-severity entry management vulnerability within the IDE (CVSS rating: 8.2) that might enable any put in extension to entry delicate API keys and credentials saved domestically in an SQLite database, enabling account takeover, information publicity, and monetary loss stemming from unauthorized API utilization. The difficulty, codenamed CursorJacking by LayerX, stays unpatched.

“Cursor doesn’t implement entry management boundaries between extensions and this database,” LayerX researcher Roy Paz mentioned. “Exploitation of this vulnerability can result in publicity of session tokens and API keys, unauthorized entry to Cursor backend providers, and information theft through person impersonation.”

Cursor has maintained that the entry is restricted to the native machine the place the person has already put in and granted permissions to the extension, that means any rogue extension with native file system entry might probably extract helpful info from varied utility information shops. To counter the menace, it is important that customers keep on with downloading trusted extensions.

Tags: CLICodeCursorCVSSEnableExecutionFixesFlawsGeminiGoogleRCE
Admin

Admin

Next Post
Introducing ARFBench: A time collection question-answering benchmark primarily based on actual incidents – Machine Studying Weblog | ML@CMU

Introducing ARFBench: A time collection question-answering benchmark primarily based on actual incidents – Machine Studying Weblog | ML@CMU

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Introducing ARFBench: A time collection question-answering benchmark primarily based on actual incidents – Machine Studying Weblog | ML@CMU

Introducing ARFBench: A time collection question-answering benchmark primarily based on actual incidents – Machine Studying Weblog | ML@CMU

April 30, 2026
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Allow Code Execution

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Allow Code Execution

April 30, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved