CVE-2025-61593
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-09

Assigner: GitHub, Inc.

Description
Cursor is a code editor built for programming with AI. In versions 1.7 and below, a vulnerability in the way Cursor CLI Agent protects its sensitive files (i.e. */.cursor/cli.json) allows attackers to modify the content of the files through prompt injection, thus achieving remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive filesystems. This issue is fixed in a commit, 25b418f, but has yet to be released as of October 3, 2025.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-09
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anysphere cursor to 1.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CWE-178 The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Cursor CLI Agent versions 1.7 and below, where the protection of sensitive files (such as */.cursor/cli.json) is flawed. Attackers can exploit this by using prompt injection to modify the content of these sensitive files. On case-insensitive filesystems, this modification can lead to remote code execution (RCE), allowing attackers to run arbitrary code remotely.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to achieve remote code execution on your system. This means the attacker could run arbitrary commands or code with the privileges of the Cursor CLI Agent, potentially leading to system compromise, data theft, or further attacks.


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability is fixed in a commit (25b418f) but not yet released, immediate mitigation steps include avoiding use of Cursor CLI Agent versions 1.7 and below, restricting access to sensitive files such as */.cursor/cli.json, and monitoring for suspicious prompt injection attempts. Applying the fix once it is officially released is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart