PT-2026-1985 · Unknown · Gemini-Mcp-Tool

Gothburz

+1

·

Published

2026-01-09

·

Updated

2026-01-31

·

CVE-2026-0755

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions gemini-mcp-tool (affected versions not specified)
Description The gemini-mcp-tool software contains a critical flaw in the
execAsync
method that allows for unauthenticated remote code execution (RCE). This issue stems from a lack of proper input validation before executing system calls, enabling attackers to inject malicious shell commands. An attacker can reach a network-accessible MCP endpoint and send crafted input to the
execAsync
method, causing the service to execute commands as the gemini-mcp-tool service account. Successful exploitation could lead to full host compromise, including file read/write access, persistence, credential theft, and potential takeover of AI/ML platforms. The root cause is identified as an OS Command Injection (CWE-78) due to insufficient sanitization and lack of parameterized execution. Attackers can leverage shell metacharacters to inject commands.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-0755
ZDI-26-021

Affected Products

Gemini-Mcp-Tool