Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-4cxx-hrm3-49rm | Vendor Advisory Mitigation |
Configurations
History
25 Aug 2025, 01:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Anysphere
Anysphere cursor |
|
| CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| References | () https://github.com/cursor/cursor/security/advisories/GHSA-4cxx-hrm3-49rm - Vendor Advisory, Mitigation |
05 Aug 2025, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Aug 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-05 01:15
Updated : 2025-08-25 01:36
NVD link : CVE-2025-54135
Mitre link : CVE-2025-54135
CVE.ORG link : CVE-2025-54135
JSON object : View
Products Affected
anysphere
- cursor
