CVE-2025-54135
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2025-54135. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1Attack Vector Metrics
Impact Metrics
Description
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
Available Exploits
Related News
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.BackgroundTenable’s Research Spec…
Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has …
EU Vulnerability Database
Monitored by ENISA for EU cybersecurity
ENISA Analysis
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
Affected Products (ENISA)
ENISA Scoring
CVSS Score (3.1)
EPSS Score
Data provided by ENISA EU Vulnerability Database. Last updated: August 5, 2025
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
🔥 Top 10 Trending CVEs (06/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54982](https://nvd.nist.gov/vuln/detail/CVE-2025-54982)** - 📝 An improper verification of cryptographic signature in Zscalers SAML authentication mechanism on the server-side allowed an authentication abuse. - 📅 **Published:** 05/08/2025 - 📈 **CVSS:** 9.6 - 🧭 …
🔥 Top 10 Trending CVEs (05/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54574](https://nvd.nist.gov/vuln/detail/CVE-2025-54574)** - 📝 Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when …
‘CurXecute’ Bug in Cursor IDE Lets Hackers Run Code Just by Feeding Malicious Prompts Security researchers have discovered a nasty vulnerability called **CurXecute (CVE-2025-54135)** in the AI-powered code editor **Cursor**. Here’s why this one’s raising eyebrows: * Hackers can use **prompt injection** to trick the AI agent into running their …