CVE-2025-61593
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anysphere | cursor | to 1.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
| CWE-178 | The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Cursor CLI Agent versions 1.7 and below, where the protection of sensitive files (such as */.cursor/cli.json) is flawed. Attackers can exploit this by using prompt injection to modify the content of these sensitive files. On case-insensitive filesystems, this modification can lead to remote code execution (RCE), allowing attackers to run arbitrary code remotely.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to achieve remote code execution on your system. This means the attacker could run arbitrary commands or code with the privileges of the Cursor CLI Agent, potentially leading to system compromise, data theft, or further attacks.
What immediate steps should I take to mitigate this vulnerability?
Since the vulnerability is fixed in a commit (25b418f) but not yet released, immediate mitigation steps include avoiding use of Cursor CLI Agent versions 1.7 and below, restricting access to sensitive files such as */.cursor/cli.json, and monitoring for suspicious prompt injection attempts. Applying the fix once it is officially released is also recommended.