CVE-2025-61592
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-09

Assigner: GitHub, Inc.

Description
Cursor is a code editor built for programming with AI. In versions 1.7 and below, automatic loading of project-specific CLI configuration from the current working directory (<project>/.cursor/cli.json) could override certain global configurations in Cursor CLI. This allowed users running the CLI inside a malicious repository to be vulnerable to Remote Code Execution through a combination of permissive configuration (allowing shell commands) and prompt injection delivered via project-specific Rules (<project>/.cursor/rules/rule.mdc) or other mechanisms. The fix for this issue is currently available as a patch 2025.09.17-25b418f. As of October 3, 2025 there is no release version.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-09
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anysphere cursor to 1.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Cursor, a code editor for programming with AI, in versions 1.7 and below. It involves the automatic loading of project-specific CLI configuration files from the current working directory, which can override global Cursor CLI settings. If a user runs the CLI inside a malicious repository, this can lead to Remote Code Execution due to permissive configurations that allow shell commands and prompt injection via project-specific rules or other mechanisms.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to execute arbitrary code remotely on your system if you run the Cursor CLI inside a malicious repository. This can lead to full compromise of confidentiality, integrity, and availability of your system and data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update Cursor to a version that includes the patch 2025.09.17-25b418f or later once it is released. Until then, avoid running Cursor CLI inside untrusted or potentially malicious project directories that contain .cursor/cli.json or .cursor/rules/rule.mdc files, as these can be used to execute remote code.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart