Notebookcheck Logo

"GerriScary" vulnerability in Gerrit exposed code integrity risk across key Google projects

A developer navigates complex source code workflows, where permission misconfigurations and automation can introduce silent risks such as the GerriScary vulnerability disclosed in Google's Gerrit-based projects (Image source: Freepik)
A developer navigates complex source code workflows, where permission misconfigurations and automation can introduce silent risks such as the GerriScary vulnerability disclosed in Google's Gerrit-based projects (Image source: Freepik)
The misconfiguration in Google's open-source code review system allowed unauthorised code revisions in at least 18 projects, prompting security updates and wider warnings for Gerrit users.

A recently disclosed vulnerability in Gerrit, the open-source code review system used by Google and others, may have exposed a pathway for unauthorised code to be introduced into critical software projects without standard approval processes. Security researchers at Tenable revealed that the flaw stemmed from misconfigured permissions and review label logic. In certain configurations, attackers could exploit a feature known as "addPatchSet" to modify already approved changes, potentially introducing malicious code without triggering a re-review.

A separate report by CybersecurityAsia.net confirmed that attackers could bypass manual review stages and use automated tools to insert unauthorised code with no user interaction.

At least 18 high-profile repositories were identified as vulnerable, including projects linked to Chromium, Dart, Bazel, and other infrastructure components. The issue also involved a race condition in the automated submission process, allowing attackers to act within a brief window before code was merged.

At the time of disclosure, no confirmed exploitation of the vulnerability had been observed in the wild. Tenable conducted responsible testing using benign code and did not attempt a full end-to-end exploit of the vulnerability.

Google has since implemented configuration changes to mitigate the problem. Meanwhile, Tenable has warned that other open-source projects using Gerrit should review their configurations, as similar settings may exist elsewhere, and it recommends that all Gerrit users audit permission rules and label persistence policies to ensure code integrity. The underlying misconfigurations may also affect other organisations using Gerrit, particularly where default permission settings and automated code submission processes are in place. This incident underscores the ongoing importance of secure development environments in the open-source ecosystem.

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
Mail Logo
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2025 06 > "GerriScary" vulnerability in Gerrit exposed code integrity risk across key Google projects
Louise Burke, 2025-06-28 (Update: 2025-06-28)