Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cursor
Cursor cursor Microsoft Microsoft windows |
|
| Vendors & Products |
Cursor
Cursor cursor Microsoft Microsoft windows |
Tue, 04 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0. | |
| Title | Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-04T22:51:42.609Z
Updated: 2025-11-07T14:26:57.543Z
Reserved: 2025-10-27T15:26:14.127Z
Link: CVE-2025-64107
Updated: 2025-11-05T14:20:25.680Z
Status : Awaiting Analysis
Published: 2025-11-04T23:15:44.330
Modified: 2025-11-06T19:45:30.990
Link: CVE-2025-64107
No data.