Cursor is a code editor built for programming with AI. In versions 1.7 and below, when MCP uses OAuth authentication with an untrusted MCP server, an attacker can impersonate a malicious MCP server and return crafted, maliciously injected commands during the interaction process, leading to command injection and potential remote code execution. If chained with an untrusted MCP service via OAuth, this command injection vulnerability could allow arbitrary code execution on the host by the agent. This can then be used to directly compromise the system by executing malicious commands with full user privileges. This issue does not currently have a fixed release version, but there is a patch, 2025.09.17-25b418f.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-wj33-264c-j9cq | Vendor Advisory |
Configurations
History
17 Oct 2025, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cursor/cursor/security/advisories/GHSA-wj33-264c-j9cq - Vendor Advisory | |
| First Time |
Anysphere
Anysphere cursor |
|
| CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* |
03 Oct 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-03 17:15
Updated : 2025-10-17 17:25
NVD link : CVE-2025-61591
Mitre link : CVE-2025-61591
CVE.ORG link : CVE-2025-61591
JSON object : View
Products Affected
anysphere
- cursor
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
