Google Patches Critical CVSS 10 Gemini CLI Vulnerability Allowing Remote Code Execution

Google has addressed a critical security flaw in its Gemini CLI npm package and the associated GitHub Actions workflow that could have allowed attackers to execute arbitrary code on affected host systems. The flaw involved improper loading of attacker-controlled content as Gemini configuration, posing a high risk in continuous integration environments.
What happened
Google identified and fixed a maximum severity vulnerability in the Gemini CLI tooling, which includes the '@google/gemini-cli' npm package and the 'google-github-actions/run-gemini-cli' GitHub Actions workflow. This vulnerability allowed an unprivileged, external attacker to force the loading of malicious content as Gemini configuration files. Due to this weakness, attackers could execute arbitrary commands on the host machines running the affected software.
The flaw affects both local use of the Gemini CLI package and automated workflows that utilize the official GitHub Actions integration, potentially exposing continuous integration systems to command injection risks. Google’s patch aims to prevent the unauthorized loading of malicious configuration data.
Why it matters
This vulnerability is rated as maximum severity with a CVSS score of 10, indicating a critical risk in affected development and CI/CD environments. Arbitrary code execution vulnerabilities in CI systems are particularly concerning as they can lead to broader compromise across development pipelines, potentially impacting source code integrity and deployment processes.
Since Gemini CLI is integrated into automation workflows via GitHub Actions, the flaw could have had implications beyond local systems, affecting cloud environments that leverage these workflows. Addressing this issue is essential to maintain the security of software development pipelines that depend on these widely used tools.
What security teams should do
Security teams should promptly update to the fixed versions of the '@google/gemini-cli' npm package and the 'google-github-actions/run-gemini-cli' workflow to mitigate the risk of exploitation. Reviewing usage of Gemini CLI within automation pipelines and verifying no unauthorized configurations have been loaded or executed is recommended.
Additionally, monitoring logs for unusual activity related to Gemini CLI operations and reviewing access controls around CI environments can help detect potential exploitation attempts related to this vulnerability.
Key technical details
The root cause of the vulnerability was the ability for attackers to supply and force the CLI tool to load malicious configuration files, thereby escalating privileges to execute arbitrary commands on a host system. The vulnerability impacted both the standalone Gemini CLI npm package and the GitHub Actions workflow implementation.
This flaw specifically allowed unprivileged external actors to inject their own content during the configuration loading phase, which would then be interpreted and executed by the CLI. The fix involves validating and restricting configuration loading mechanisms to prevent unauthorized code execution.
Affected organizations/products
The vulnerability affected the '@google/gemini-cli' npm package and the 'google-github-actions/run-gemini-cli' GitHub Actions workflow. Both local usage in development environments and automated CI workflows leveraging these tools are potentially impacted.
Source attribution
https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html