- Description
- Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) in order to exploit. In that case, it can send sensitive information to an attacker-controlled external server. This is fixed in version 1.3.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- cursor
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-918
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132) https://t.co/uTGYbSsYVu https://t.co/20GZAqaOBx
@ngnicky
8 Aug 2025
684 Impressions
3 Retweets
5 Likes
3 Bookmarks
0 Replies
0 Quotes
👉 Episode 4: Cursor IDE Arbitrary Data Exfiltration via Mermaid (CVE-2025-54132) 🏴☠️ https://t.co/3sbhYkPSSx
@wunderwuzzi23
4 Aug 2025
4232 Impressions
8 Retweets
40 Likes
26 Bookmarks
1 Reply
2 Quotes
CVE-2025-54132 Prompt Injection Vulnerability in Cursor Code Editor Versions Below 1.3 https://t.co/vpJ6iJAmOk
@VulmonFeeds
1 Aug 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-54132 Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get render… https://t.co/ejNKgV8qVV
@CVEnew
1 Aug 2025
393 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC3BD06-C788-4AE8-80B9-8CF608AB5F5F",
"versionEndExcluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]