Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cursor
Cursor cursor |
|
Vendors & Products |
Cursor
Cursor cursor |
Tue, 05 Aug 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9. | |
Title | Cursor Agent is vulnerable to prompt injection via MCP Special Files | |
Weaknesses | CWE-78 CWE-829 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-05T00:11:07.363Z
Updated: 2025-08-05T13:58:39.517Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54135

Updated: 2025-08-05T13:58:36.324Z

Status : Awaiting Analysis
Published: 2025-08-05T01:15:41.410
Modified: 2025-08-05T14:34:17.327
Link: CVE-2025-54135

No data.