CVE-2025-54135

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-54135 is a security vulnerability in the Cursor AI code editor that could lead to remote code execution. This vulnerability, dubbed "CurXecute" by Aim Labs, arises from the way Cursor interacts with Model Control Protocol (MCP) servers to access external tools. By feeding malicious prompts to the AI agent, an attacker can trigger the execution of attacker-controlled commands. The vulnerability involves a prompt injection that silently rewrites the "~/.cursor/mcp.json" file. This file is used to configure custom MCP servers in Cursor, and the vulnerability allows the execution of any new entry without requiring confirmation. An attacker can inject a malicious command through a single line of prompting, influencing Cursor's actions and gaining remote code execution under the user's privileges.

Description
-

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

65

  1. 01/08/2025 A high-severity flaw (CVE-2025-54135) in Cursor AI Code Editor could enable remote code execution via prompt injection! 🚨 Version 1.3 released to patch this critical vulnerability. Act now to secure your systems! Source: https://t.co/HujC8drGpF

    @kernyx64

    2 Aug 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. AIコードエディタ「Cursor」において、リモートコード実行(RCE)が可能となる深刻な脆弱性(CVE-2025-54135、CVSS 8.6)が発見され、2025年7月29日リリースのバージョン1.3で修正された。 この脆弱性「CurXecute」は、

    @yousukezan

    1 Aug 2025

    104717 Impressions

    139 Retweets

    393 Likes

    201 Bookmarks

    2 Replies

    23 Quotes

  3. El editor de código con IA, Cursor, corrigió una grave falla de ejecución remota de código (RCE), registrada como CVE-2025-54135. Suponía un riesgo crítico para la seguridad de los desarrolladores. El fallo estaba en el protocolo de control del modelo (MCP). Al procesar da

    @citarafy

    1 Aug 2025

    36 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  4. A vulnerability named CurXecute (CVE-2025-54135) affects nearly all versions of the AI-powered Cursor IDE, allowing remote code execution via prompt-injection attacks. Exploitation could lead to ransomware and data theft. https://t.co/aXAKQ3NgKQ

    @securityRSS

    1 Aug 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨CVE-2025-54135: Cursor AI Code Editor Vulnerability Patched After Prompt Injection Exploit Allowed Remote Command Execution CVSS: 8.6 Video Credit: HiddenLayer Advisory no longer available on GitHub: https://t.co/dNQbdgR9Ff https://t.co/HLZu6k7C7c

    @DarkWebInformer

    1 Aug 2025

    4692 Impressions

    5 Retweets

    31 Likes

    8 Bookmarks

    1 Reply

    2 Quotes

  6. 🚨 A single Slack message could hijack Cursor—AI code editor—with zero clicks. CVE-2025-54135 let attackers run remote code just by posting in a public channel. Cursor auto-executed it. No prompts. No approval. Details here → https://t.co/7dB6UOzzUo

    @TheHackersNews

    1 Aug 2025

    9230 Impressions

    27 Retweets

    65 Likes

    11 Bookmarks

    2 Replies

    0 Quotes

References

Sources include official advisories and independent security research.