AI Dev Tools Under Attack: Two Critical RCE Vulnerabilities You Need to Patch Now | Stack of Truths

AI Dev Tools Under Attack: Two Critical RCE Vulnerabilities You Need to Patch Now | Stack of Truths

AI Dev Tools Under Attack: Two Critical RCE Vulnerabilities You Need to Patch Now

May 1, 2026 — 6 min read — Pedro Jose

In my pentesting work, I’ve seen a dangerous pattern emerging: AI development tools are being shipped with broken trust models. This week, two major vulnerabilities prove the point.

Google’s Gemini CLI has a flaw that allows attackers to execute code on your CI/CD servers. Cursor IDE has a similar issue that compromises developer workstations. Both are critical. Both need your attention now.

⚠️ HERE’S THE PROBLEM

Your AI coding assistant was designed to make you faster. Instead, it’s become a delivery mechanism for attackers. Trusted workflows are now attack surfaces.

Vulnerability One: The CI/CD Nightmare (CVSS 10.0)

The first flaw affects Google’s Gemini CLI. I’ve analyzed the attack vector, and it’s alarmingly simple.

An attacker creates a malicious configuration folder called .gemini/ inside a pull request. When your CI/CD pipeline runs Gemini on that code, the tool automatically trusts and executes the attacker’s configuration — before any sandboxing kicks in.

Here’s what happens next:

  • The attacker’s code runs on your build server
  • They steal your cloud credentials, SSH keys, and database passwords
  • They backdoor your build pipeline
  • Your next release ships with their malware

This is not a theoretical vulnerability. It’s a CVSS 10.0 for a reason.

🔐 CVSS 10.0 means: The highest possible severity. Exploitation is trivial. Impact is catastrophic. Patch immediately.

Vulnerability Two: The Developer Workstation Compromise (CVSS 8.1)

Cursor IDE, a popular AI code editor, suffers from a similar trust problem — but the target is different.

Attackers can embed hidden Git hooks inside malicious repositories. When a developer clones the repo and Cursor’s AI agent performs routine operations like git checkout, the hooks execute automatically. No user interaction required. Just routine work.

The impact:

  • Attacker code runs on the developer’s machine
  • SSH keys, cloud tokens, and source code are stolen
  • Local API keys are exposed via extensions
  • Lateral movement to production systems becomes possible

The vulnerability is tracked as CVE-2026-26268 and fixed in Cursor version 2.5. But the pattern is the real story.

What These Vulnerabilities Have in Common

\
Gemini CLICursor IDE
CVSS 10.0 (CRITICAL) 8.1 (HIGH)
Attack Vector Malicious .gemini/ folders in PRs Hidden Git hooks in repos
Target CI/CD servers (build pipelines) Developer workstations
Root Cause Automatic trust of untrusted input Automatic trust of untrusted input
Fix Available Gemini CLI 0.39.1+ Cursor 2.5+

Both vulnerabilities share the same fatal assumption: AI tools trust the code they’re analyzing. No verification. No sandbox. No “are you sure?”

┌─────────────────────────────────────────────────────────────┐ │ THE COMMON PROBLEM │ ├─────────────────────────────────────────────────────────────┤ │ │ │ Traditional security: Human reviews code → human approves │ │ → code executes │ │ │ │ AI tool security: AI reads code → AI executes commands │ │ → no review, no approval │ │ │ │ The human step is missing. That’s the vulnerability. │ │ │ └─────────────────────────────────────────────────────────────┘

Why This Matters for Your Organization

These vulnerabilities aren’t isolated incidents. They’re the first wave of a new class of supply chain attacks.

Consider what an attacker gains if they compromise your CI/CD pipeline:

  • Your source code — trade secrets, intellectual property
  • Your deployment keys — they can ship their own “updates” to your customers
  • Your cloud infrastructure — with your credentials, they control your servers
  • Your customer data — once they’re inside, they can exfiltrate anything

Consider what an attacker gains if they compromise a single developer workstation:

  • SSH keys to your entire infrastructure
  • Cloud console access
  • Source code of every project they’ve worked on
  • Credentials for every service they use
🔐 THE BOTTOM LINE

We’re racing to adopt AI development tools without understanding their security implications. Attackers are already exploiting that gap.

What You Should Do Now

  1. Update Gemini CLI to version 0.39.1 or later — this patches the CVSS 10.0 RCE
  2. Update Cursor to version 2.5 or later — addresses CVE-2026-26268
  3. Review your CI/CD pipeline — are you running AI tools on untrusted pull requests?
  4. Audit Git hooks in all repositories — check .git/hooks/ for suspicious scripts
  5. Rotate potentially exposed secrets — if you ran vulnerable versions, assume compromise
  6. Pentest your AI toolchain — automated scanners won’t find trust model flaws. Human-led testing will.
🔮 The Bigger Picture

These vulnerabilities are symptoms of a larger problem: we’re deploying AI agents without updating our security models.

A human would ask: “Should I run this code?” An AI agent just runs it.

The tools we trust to help us code are becoming attack vectors. And most organizations have never tested them.

Don’t wait for the next CVSS 10.0. Assume your AI toolchain is insecure. Then secure it.
🦞🔐

Using AI coding assistants? Time to pentest your toolchain.

I break AI agents — and the development tools you use every day. CI/CD security. Developer workstation assessments. Supply chain pentesting.

📩 DM @StackOfTruths on X

Free 15-min consultation. No hard sell. Just honest answers about your AI agent security.


© 2026 Stack of Truths — AI Agent Pentesting & Security Audits. All opinions are my own.
English is not my first language, I use AI to help write clearly. The ideas and experience are mine.

🦞 “10 years cybersecurity. 5 years AI. I break AI agents so you don’t get broken.”

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

Leave a Reply

Your email address will not be published. Required fields are marked *


You cannot copy content of this page

error

Enjoy this blog? Please spread the word :)

Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share