Tech »  Topic »  This CVSS 10.0 RCE vuln has been patched, automatically for some, so better check those workflows

This CVSS 10.0 RCE vuln has been patched, automatically for some, so better check those workflows


If you use Gemini CLI, watch out: Google has patched a CVSS 10.0 vulnerability in its command-line AI tool and is warning anyone running it in headless mode, or through GitHub Actions, to review their workflows.

The update to Gemini CLI and the run-gemini-cli GitHub Action, published last week but largely unnoticed until one of the two credited research teams published its writeup on Wednesday, fixes a critical - and apparently easy-to-abuse - flaw tied to over-permissive workspace trust settings.

Per Google's advisory published to GitHub, the issue stems from how the headless mode of Gemini CLI (frequently used in CI/CD environments and increasingly by AI agents) handles workspace folder trust: It automatically assumes any of the workspace folders it's active in are trusted for the purpose of loading configuration files and environment variables. 

We trust you can see the problem here. 

Novee researcher Elad Meged discovered the ...


Copyright of this story solely belongs to theregister.co.uk . To see the full text click HERE