CVE-2025-54136
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-02

Last updated on: 2025-08-25

Assigner: GitHub, Inc.

Description
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.exe) without triggering any warning or re-prompt. If an attacker has write permissions on a user's active branches of a source repository that contains existing MCP servers the user has previously approved, or allows an attacker has arbitrary file-write locally, the attacker can achieve arbitrary code execution. This is fixed in version 1.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-02
Last Modified
2025-08-25
Generated
2026-05-07
AI Q&A
2025-08-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anysphere cursor to 1.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Cursor, a code editor for programming with AI, in versions 1.2.4 and below. Attackers who have write permissions on a trusted MCP configuration file in a shared GitHub repository or locally on the target's machine can modify this file to execute malicious commands remotely and persistently. Once a collaborator accepts a harmless MCP, the attacker can silently replace it with a malicious command without any warnings or prompts, leading to arbitrary code execution. This issue is fixed in version 1.3.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker to execute arbitrary code on your machine remotely and persistently by modifying trusted configuration files. This can lead to unauthorized actions such as running malicious programs (e.g., calc.exe), potentially compromising your system's confidentiality, integrity, and availability.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Cursor to version 1.3 or later, as this version contains the fix for the vulnerability. Additionally, restrict write permissions on MCP configuration files and source repository branches to trusted users only to prevent unauthorized modifications.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart