Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive editor files, such as the .vscode/settings.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-08-05 01:15
Updated : 2025-08-25 01:38
NVD link : CVE-2025-54130
Mitre link : CVE-2025-54130
CVE.ORG link : CVE-2025-54130
JSON object : View
Products Affected
anysphere
- cursor
CWE
