Google Gemini CLI RCE: CVSS 10 Flaw Exposes CI/CD to Attack
Google has patched a critical remote code execution (RCE) vulnerability in its Gemini CLI, specifically impacting the @google/gemini-cli npm package and the google-github-actions/run-gemini-cli GitHub Actions workflow. The Hacker News reports this flaw, rated CVSS 10.0, could allow an unprivileged external attacker to inject malicious content as Gemini configuration, leading to arbitrary command execution on host systems.
This isnβt just another bug; itβs a supply chain risk targeting CI/CD pipelines. An attacker exploiting this could compromise build environments, inject backdoors into deployed applications, or exfiltrate sensitive source code and credentials. The implications extend far beyond a single compromised CLI session, potentially affecting entire development and deployment lifecycles.
For defenders, this highlights the persistent challenge of securing developer tooling and CI/CD infrastructure. Even seemingly minor CLI utilities, when integrated into automated workflows, can become high-severity attack vectors if not rigorously secured. The attackerβs calculus here is clear: target the weakest link in the build chain for maximum impact.
What This Means For You
- If your organization uses the `@google/gemini-cli` npm package or the `google-github-actions/run-gemini-cli` GitHub Action, patch immediately. Prioritize a review of all CI/CD pipelines where Gemini CLI is integrated. Look for any anomalous build activity or unauthorized code changes that might indicate a prior compromise.
Related ATT&CK Techniques
π‘οΈ Detection Rules
1 rule Β· 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β export to any SIEM format via the Intel Bot.
Exploitation Attempt β Google
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Gemini-CLI-RCE | RCE | npm package @google/gemini-cli |
| Gemini-CLI-RCE | RCE | GitHub Actions workflow google-github-actions/run-gemini-cli |
| Gemini-CLI-RCE | Code Injection | Malicious content loading as Gemini configuration |