PT-2025-31702 · Cursor · Cursor
Chaandrey
·
Published
2025-08-01
·
Updated
2025-08-06
·
CVE-2025-54136
7.2
High
Base vector | Vector | AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cursor versions 1.2.4 and below
**Description:**
Cursor is a code editor built for programming with AI. A flaw allows attackers to achieve remote and persistent code execution by modifying a trusted Model Context Protocol (MCP) configuration file within a shared GitHub repository or locally on the target machine. Once a collaborator accepts a harmless MCP, an attacker can silently replace it with a malicious command, such as `calc.exe`, without any warning or re-prompt. This is possible if the attacker has write permissions to a user's active branches containing existing MCP servers or has arbitrary local file-write access.
**Recommendations:**
Cursor versions prior to 1.3 are affected.
Update to version 1.3 to address this issue.
Fix
RCE
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 31
- https://nvd.nist.gov/vuln/detail/CVE-2025-54136 · Security Note
- https://github.com/cursor/cursor/security/advisories/GHSA-24mc-g4xr-4395⭐ 30947 🔗 1994 · Note
- https://twitter.com/CheckPointSW/status/1952810479597793703 · Twitter Post
- https://twitter.com/NormanOre/status/1952835044478714032 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1952792938196435190 · Twitter Post
- https://t.me/pentestingnews/65649 · Telegram Post
- https://twitter.com/dansantanna/status/1953056865241448594 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1952180480184569883 · Twitter Post
- https://t.me/thehackernews/7284 · Telegram Post
- https://twitter.com/Cyber_O51NT/status/1952727180309356937 · Twitter Post
- https://t.me/ckuRED/626 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1mj0l93/top_10_trending_cves_06082025 · Reddit Post
- https://t.me/cveNotify/130639 · Telegram Post
- https://twitter.com/StopMalvertisin/status/1952716299483709646 · Twitter Post
- https://twitter.com/z3nch4n/status/1952744115168481492 · Twitter Post