gemini-mcp-tool execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of gemini-mcp-tool. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the execAsync method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27783.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-26-021/ |
Configurations
No configuration.
History
No history.
Information
Published : 2026-01-23 04:16
Updated : 2026-01-26 15:03
NVD link : CVE-2026-0755
Mitre link : CVE-2026-0755
CVE.ORG link : CVE-2026-0755
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
