CVE-2025-64106
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-07
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anysphere | cursor | to 2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an input validation flaw in Cursor's MCP server installation (versions 1.7.28 and below) that allows specially crafted deep-links to bypass standard security warnings. When a victim navigates to such a malicious deep-link and accepts the prompt, the expected security warning modal is not shown correctly, and commands specified by the attacker are executed without the user's proper awareness.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to the execution of arbitrary commands on the victim's system without proper user consent or awareness. This can result in unauthorized access, data compromise, or system manipulation, potentially causing significant harm depending on the commands executed by the attacker.