A critical zero-day vulnerability has been disclosed in the open-source Gemini MCP Tool, exposing systems to unauthenticated remote code execution. The flaw, tracked as CVE-2026-0755, allows attackers to execute arbitrary operating system commands without requiring any user interaction or authentication. Security researchers reported that the issue was publicly disclosed after unsuccessful coordination attempts with the vendor. Due to its high severity and ease of exploitation, the vulnerability poses a serious threat to organizations running the affected tool in production environments, especially where it is exposed to the internet. The vulnerability exists due to improper input validation in the tool’s command execution functionality. Specifically, user-supplied input is passed directly to system-level execution functions without adequate sanitization or restriction. This results in a classic command injection condition, enabling attackers to append or inject malicious commands that are executed with the privileges of the service process. Because the Gemini MCP Tool does not enforce authentication controls for the vulnerable function, exploitation can be performed remotely with minimal technical effort, significantly increasing the likelihood of active exploitation. To reduce risk, organizations should immediately restrict or disable access to Gemini MCP Tool instances, particularly those exposed to untrusted networks. Until an official patch or fix is released, administrators are strongly advised to isolate affected systems, enforce strict network access controls, and monitor for suspicious command execution or system behavior. Where possible, replacing the tool with a more secure and actively maintained alternative should be considered. Regular security assessments and prompt application of updates remain critical to preventing similar zero-day exploitation scenarios.
A high-severity security vulnerability has been disclosed in OpenClaw (formerly Clawdbot/Moltbot) that enables remote code execution (RCE) through a single malicious link. Tracked ...
A newly formed Russian hacker alliance calling itself Russian Legion has launched a coordinated cyberattack campaign against Denmark, marking a notable escalation in state-aligned ...
Fraudulent High-Yield Investment Programs (HYIPs) are rapidly spreading worldwide, promising “assured” profits that no genuine investment model can realistically deliver. These...