Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) in order to exploit. In that case, it can send sensitive information to an attacker-controlled external server. This is fixed in version 1.3.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cursor
Cursor cursor |
|
Vendors & Products |
Cursor
Cursor cursor |
Fri, 01 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) in order to exploit. In that case, it can send sensitive information to an attacker-controlled external server. This is fixed in version 1.3. | |
Title | Cursor's Mermaid Diagram Tool is Vulnerable to an Arbitrary Image Fetch | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-01T23:05:17.187Z
Updated: 2025-08-04T17:17:40.695Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54132

Updated: 2025-08-04T17:17:25.789Z

Status : Awaiting Analysis
Published: 2025-08-01T23:15:24.753
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-54132

No data.