PT-2025-31649 · Cursor · Cursor
Published
2025-08-01
·
Updated
2025-08-04
·
CVE-2025-54135
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions:
Cursor versions (affected versions not specified)
Description:
A vulnerability, named CurXecute (CVE-2025-54135), enables prompt-injection attacks leading to remote code execution. Exploitation could lead to ransomware and data theft. The vulnerability allows attackers to run remote code by posting in a public channel, with automatic execution occurring without prompts or approval.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Related Identifiers
CVE-2025-54135
Affected Products
Cursor
References · 19
- https://github.com/cursor/cursor⭐ 30947 🔗 1994 · Note
- https://twitter.com/mika_daniel9/status/1951978866240590018 · Twitter Post
- https://twitter.com/kernyx64/status/1951493326030373365 · Twitter Post
- https://twitter.com/TheHackersNews/status/1951304998416945207 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1952180480184569883 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1951311177989931294 · Twitter Post
- https://t.me/TheDarkWebInformer/19184 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1mgfjzq/top_10_trending_cves_03082025 · Reddit Post
- https://twitter.com/freedomhack101/status/1951637014375493698 · Twitter Post
- https://twitter.com/MalwarePatrol/status/1951639624566104362 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mfpfdx/top_10_trending_cves_02082025 · Reddit Post
- https://twitter.com/securityRSS/status/1951373087007477883 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1951352424402391325 · Twitter Post
- https://twitter.com/godeepweb/status/1952027437178421627 · Twitter Post
- https://twitter.com/imdkarfa/status/1951895425704919280 · Twitter Post