PT-2026-2918 · Cursor · Cursor
Danus365
·
Published
2026-01-14
·
Updated
2026-03-09
·
CVE-2026-22708
CVSS v4.0
7.2
High
| AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U |
Name of the Vulnerable Software and Affected Versions
Cursor versions prior to 2.3
Description
Cursor is a code editor designed for programming with AI. When the Cursor Agent operates in Auto-Run Mode with Allowlist mode enabled, certain shell built-ins can be executed without appearing on the allowlist and without user approval. This allows an attacker, through indirect or direct prompt injection, to compromise the shell environment by setting, modifying, or removing environment variables that impact trusted commands. This can lead to remote code execution (RCE).
Recommendations
Versions prior to 2.3 should be updated to version 2.3.
Exploit
Fix
RCE
Special Elements Injection
OS Command Injection
Improper Privilege Management
Code Injection
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Cursor