PT-2025-31699 · Cursor · Cursor

Yellowday60-Git

·

Published

2025-08-01

·

Updated

2025-08-02

·

CVE-2025-54131

CVSS v3.1
6.4
VectorAV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Cursor versions prior to 1.3

Description:

Cursor, a code editor built for programming with AI, allows an attacker to bypass the allow list in auto-run mode using a backtick (`) or $(cmd). This bypass enables arbitrary command execution outside of the allowlist without user approval, provided the user has modified default settings to use an allowlist instead of requiring approval for each terminal call. The issue can be triggered if chained with indirect prompt injection.

Recommendations:

Update to version 1.3 or later.

Fix

Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-54131

Affected Products

Cursor