Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive editor files, such as the .vscode/settings.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
References
Link | Resource |
---|---|
https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f | Vendor Advisory |
Configurations
History
25 Aug 2025, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f - Vendor Advisory | |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
First Time |
Anysphere cursor
Anysphere |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Aug 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 01:15
Updated : 2025-08-25 01:38
NVD link : CVE-2025-54130
Mitre link : CVE-2025-54130
CVE.ORG link : CVE-2025-54130
JSON object : View
Products Affected
anysphere
- cursor
CWE