Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-6r98-6qcw-rxrw | Vendor Advisory |
Configurations
History
10 Nov 2025, 18:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cursor/cursor/security/advisories/GHSA-6r98-6qcw-rxrw - Vendor Advisory | |
| CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| First Time |
Anysphere
Anysphere cursor |
04 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-04 23:15
Updated : 2025-11-10 18:38
NVD link : CVE-2025-64108
Mitre link : CVE-2025-64108
CVE.ORG link : CVE-2025-64108
JSON object : View
Products Affected
anysphere
- cursor
