- Description
- Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- cursor
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-22
- Hype score
- Not currently trending
[CVE-2025-64108: HIGH] Beware prompt injection attack in Cursor code editor! Versions 1.7.44 & below vulnerable to exploitation. Upgrade to version 2.0 for a fix. #cybersecurity#cve,CVE-2025-64108,#cybersecurity https://t.co/NGC3buWJ8v https://t.co/H7ncGAL0VW
@CveFindCom
5 Nov 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-64108 NTFS Path Traversal Vulnerability in Cursor Code Editor Versions 1.7.44 and Below https://t.co/dEbVfp9bPk
@VulmonFeeds
5 Nov 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**CVE-2025-64108** pertains to a security flaw in **Cursor**, a code editor designed for programming with AI assistance. It affects version 1.7.44 and earlier, where specific **NTFS path quirks** can be exploited via **prompt injection** to bypass file protections. This bypass
@CveTodo
4 Nov 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-64108 Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitiv… https://t.co/8BB7toCQLH
@CVEnew
4 Nov 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "630DF821-F0CF-4B9C-BC9F-EB7B9FD9E4C3",
"versionEndExcluding": "2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]