Cursor is a code editor built for programming with AI. Prior to 0.51.0, by default, the setting json.schemaDownload.enable was set to True. This means that by writing a JSON file, an attacker can trigger an arbitrary HTTP GET request that does not require user confirmation. Since the Cursor Agent can edit JSON files, this means a malicious agent, for example, after a prompt injection attack already succeeded, could trigger a GET request to an attacker controlled URL, potentially exfiltrating other data the agent may have access to. This vulnerability is fixed in 0.51.0.
References
Configurations
No configuration.
History
12 Jun 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-11 18:15
Updated : 2025-06-12 16:06
NVD link : CVE-2025-49150
Mitre link : CVE-2025-49150
CVE.ORG link : CVE-2025-49150
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor