Loading HuntDB...

CVE-2025-54135

HIGH
Published 2025-08-05T00:11:07.363Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-54135. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.6
/10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.

Available Exploits

No exploits available for this CVE.

Related News

CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)

Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.BackgroundTenable’s Research Spec…

Tenable.com 2025-08-06 02:44
Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has …

Internet 2025-08-01 15:31

Affected Products

Affected Versions:

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.

Affected Products (ENISA)

cursor
cursor

ENISA Scoring

CVSS Score (3.1)

8.6
/10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.050
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 5, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 2 weeks, 3 days ago
crstux

🔥 Top 10 Trending CVEs (06/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54982](https://nvd.nist.gov/vuln/detail/CVE-2025-54982)** - 📝 An improper verification of cryptographic signature in Zscalers SAML authentication mechanism on the server-side allowed an authentication abuse. - 📅 **Published:** 05/08/2025 - 📈 **CVSS:** 9.6 - 🧭 …

Reddit 2 weeks, 4 days ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (05/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54574](https://nvd.nist.gov/vuln/detail/CVE-2025-54574)** - 📝 Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when …

1
1.0
View Original High Risk
Reddit 2 weeks, 5 days ago
Sunitha_Sundar_5980

‘CurXecute’ Bug in Cursor IDE Lets Hackers Run Code Just by Feeding Malicious Prompts Security researchers have discovered a nasty vulnerability called **CurXecute (CVE-2025-54135)** in the AI-powered code editor **Cursor**. Here’s why this one’s raising eyebrows: * Hackers can use **prompt injection** to trick the AI agent into running their …

References

Published: 2025-08-05T00:11:07.363Z
Last Modified: 2025-08-05T00:11:07.363Z
Copied to clipboard!