Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When users click malicious `cursor://anysphere.cursor-deeplink/mcp/install` links, the installation dialog does not show the arguments being passed to the command being run. If a user clicks a malicious deeplink, then examines the installation dialog and clicks through, the full command including the arguments will be executed on the machine. This is fixed in version 1.3.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cursor
Cursor cursor |
|
Vendors & Products |
Cursor
Cursor cursor |
Fri, 01 Aug 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When users click malicious `cursor://anysphere.cursor-deeplink/mcp/install` links, the installation dialog does not show the arguments being passed to the command being run. If a user clicks a malicious deeplink, then examines the installation dialog and clicks through, the full command including the arguments will be executed on the machine. This is fixed in version 1.3. | |
Title | Cursor's MCP Install Deeplink Does Not Show Arguments in its User-Dialog | |
Weaknesses | CWE-200 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-01T23:07:00.592Z
Updated: 2025-08-04T17:17:06.179Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54133

Updated: 2025-08-04T17:17:01.333Z

Status : Awaiting Analysis
Published: 2025-08-02T00:15:25.050
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-54133

No data.