{"data":{"id":"829aa091-3781-4ac6-a53a-345e93ea955f","title":"Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution","summary":"Google patched a critical flaw (CVSS score of 10.0, the highest severity) in Gemini CLI that allowed attackers to execute arbitrary commands by tricking the tool into loading malicious configuration files in headless mode (non-interactive environments used in CI/CD pipelines, which automate software testing and deployment). The vulnerability affected versions before 0.39.1 and 0.40.0-preview.3 of the npm package and version 0.1.22 of the GitHub Actions workflow. Separately, a high-severity flaw in Cursor (a code-writing AI tool) before version 2.5 could also enable code execution through prompt injection (tricking an AI by hiding instructions in its input).","solution":"Google's fix requires explicit folder trust before configuration files can be accessed. Users should review workflows and choose one of two approaches: (1) if the workflow runs on trusted inputs, set the environment variable GEMINI_TRUST_WORKSPACE: 'true' in the workflow, or (2) if it runs on untrusted inputs, review Google's guidance and set the environment variable while hardening the workflow against malicious content. Additionally, in version 0.39.1, the Gemini CLI policy engine now evaluates tool allowlisting under --yolo mode (auto-approve mode) to prevent untrusted inputs from triggering code execution via prompt injection. Users should update to @google/gemini-cli version 0.39.1 or later, @google/gemini-cli version 0.40.0-preview.3 or later, and google-github-actions/run-gemini-cli version 0.1.22 or later.","labels":["security"],"sourceUrl":"https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html","publishedAt":"2026-04-30T07:07:00.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":null,"severity":"critical","attackType":["prompt_injection","supply_chain"],"issueType":"news","affectedPackages":null,"affectedVendors":["Google"],"affectedVendorsRaw":["Google","Gemini CLI","Cursor"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":null,"disclosureDate":"2026-04-30T07:07:00.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity","availability"],"aiComponentTargeted":"agent","llmSpecific":true,"classifierConfidence":0.92,"researchCategory":null,"atlasIds":null}}