- Description
- Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- cursor
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-22
- Hype score
- Not currently trending
🚨 CVE-2025-64107 Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to comple
@AnonOzzyDude
10 Nov 2025
142 Impressions
1 Retweet
4 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-64107: HIGH] Critical security vulnerability patched in Cursor code editor v2.0. In versions 1.7.52 and below, attackers on Windows systems could exploit path manipulation to execute code without a...#cve,CVE-2025-64107,#cybersecurity https://t.co/oOGISffTf7 https://t.c
@CveFindCom
5 Nov 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-64107 Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation … https://t.co/Ph6FPmjI0R
@CVEnew
4 Nov 2025
260 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anysphere:cursor:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "E8F5CD47-F0BD-4FB2-A5D9-266C512BC943",
"versionEndExcluding": "2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]