๐ฐ Full Story
Google has released emergency patches to fix a maximum-severity (CVSS 10.0) remote code execution flaw in its Gemini command-line interface and the google-github-actions/run-gemini-cli workflow, warning that unpatched CI/CD pipelines processing untrusted inputs could be exploited.
The vulnerability, disclosed by researchers Elad Meged of Novee Security and Dan Lisichkin of Pillar Security and detailed publicly on April 30, 2026, stemmed from Gemini CLIโs headless mode automatically trusting workspace folders and loading configuration and environment variables before sandboxing.
An attacker could plant malicious config files via a pull request and achieve command execution on the host, exposing secrets, credentials and source code.
Google patched @google/gemini-cli in versions 0.39.1 and 0.40.0-preview.3 and the GitHub Action in 0.1.22.
The fix removes implicit workspace trust and tightens tool allowlisting (including changes to --yolo behavior). Operators who pinned versions or relied on previous permissive behavior should review workflows: defaulting to the newest CLI release may cause some pipelines to fail unless workflows are updated to explicitly trust folders or harden against untrusted inputs.







๐ฌ Commentary