Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive editor files, such as the .vscode/settings.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f | Vendor Advisory |
Configurations
History
25 Aug 2025, 01:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| References | () https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f - Vendor Advisory | |
| First Time |
Anysphere
Anysphere cursor |
|
| CWE | NVD-CWE-Other |
05 Aug 2025, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Aug 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-05 01:15
Updated : 2025-08-25 01:38
NVD link : CVE-2025-54130
Mitre link : CVE-2025-54130
CVE.ORG link : CVE-2025-54130
JSON object : View
Products Affected
anysphere
- cursor
CWE
