Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Posted on August 1, 2025August 1, 2025 By CWS

Cybersecurity researchers have disclosed a now-patched, high-severity safety flaw in Cursor, a preferred synthetic intelligence (AI) code editor, that would lead to distant code execution.
The vulnerability, tracked as CVE-2025-54135 (CVSS rating: 8.6), has been addressed in model 1.3 launched on July 29, 2025. It has been codenamed CurXecute by Purpose Labs, which beforehand disclosed EchoLeak.
“Cursor runs with developer‑stage privileges, and when paired with an MCP server that fetches untrusted exterior knowledge, that knowledge can redirect the agent’s management circulation and exploit these privileges,” the Purpose Labs Staff stated in a report shared with The Hacker Information.
“By feeding poisoned knowledge to the agent by way of MCP, an attacker can achieve full distant code execution beneath the person privileges, and obtain any variety of issues, together with alternatives for ransomware, knowledge theft, AI manipulation and hallucinations, and so on.”In different phrases, the distant code execution triggered by a single externally‑hosted immediate‑injection that silently rewrites the “~/.cursor/mcp.json” file and runs attacker‑managed instructions.
The vulnerability is much like EchoLeak in that the instruments, that are uncovered by Mannequin Management Protocol (MCP) servers to be used by AI fashions and facilitate interplay with exterior methods, resembling querying databases or invoking APIs, might fetch untrusted knowledge that may poison the agent’s anticipated conduct.
Particularly, Purpose Safety discovered that the mcp.json file used to configure customized MCP servers in Cursor can set off the execution of any new entry (e.g., including a Slack MCP server) with out requiring any affirmation.

This auto-run mode is especially harmful as a result of it could possibly result in the automated execution of a malicious payload that is injected by the attacker by way of a Slack message. The assault sequence proceeds as follows –

Consumer provides Slack MCP server by way of Cursor UI
Attacker posts message in a public Slack channel with the command injection payload
Sufferer opens a brand new chat and asks Cursor’s agent to make use of the newly configured Slack MCP server to summarize their messages in a immediate: “Use Slack instruments to summarize my messages”
The agent encounters a specifically crafted message designed to inject malicious instructions to its context

“The core reason for the flaw is that new entries to the worldwide MCP JSON file are beginning robotically,” Purpose Safety stated. “Even when the edit is rejected, the code execution had already occurred.”

The whole assault is noteworthy for its simplicity. But it surely additionally highlights how AI-assisted instruments can open up new assault surfaces when processing exterior content material, on this case, any third-party MCP server.
“As AI brokers preserve bridging exterior, inside, and interactive worlds, safety fashions should assume exterior context might have an effect on the agent runtime – and monitor each hop,” the corporate added.
Model 1.3 of Cursor additionally addresses one other difficulty with auto-run mode that may simply circumvent the platform’s denylist-based protections utilizing strategies like Base64-encoding, shell scripts, and enclosing shell instructions inside quotes (e.g., “e”cho bypass) to execute unsafe instructions.
Following accountable disclosure by the BackSlash Analysis Staff, Cursor has taken the step of altogether deprecating the denylist characteristic for auto-run in favor of an allowlist.
“Do not anticipate the built-in safety options offered by vibe coding platforms to be complete or foolproof,” researchers Mustafa Naamneh and Micah Gold stated. “The onus is on end-user organizations to make sure agentic methods are outfitted with correct guardrails.”
The disclosure comes as HiddenLayer additionally discovered that Cursor’s ineffective denylist strategy may be weaponized by embedding hidden malicious directions with a GitHub README.md file, permitting an attacker to steal API keys, SSH credentials, and even run blocked system instructions.
“When the sufferer seen the mission on GitHub, the immediate injection was not seen, they usually requested Cursor to git clone the mission and assist them set it up, a typical incidence for an IDE-based agentic system,” researchers Kasimir Schulz, Kenneth Yeung, and Tom Bonner famous.

“Nonetheless, after cloning the mission and reviewing the readme to see the directions to arrange the mission, the immediate injection took over the AI mannequin and compelled it to make use of the grep instrument to seek out any keys within the person’s workspace earlier than exfiltrating the keys with curl.”
HiddenLayer stated it additionally discovered extra weaknesses that might be abused to leak Cursor’s system immediate by overriding the bottom URL offered for OpenAI API requests to a proxied mannequin, in addition to exfiltrate a person’s personal SSH keys by leveraging two benign instruments, read_file and create_diagram, in what’s referred to as a instrument mixture assault.

This basically includes inserting a immediate injection command inside a GitHub README.md file that is parsed by Cursor when the sufferer person asks the code editor to summarize the file, ensuing within the execution of the command.

The hidden instruction, for its half, makes use of the read_file instrument to learn personal SSH keys belonging to the person after which makes use of the create_diagram instrument to exfiltrate the keys to an attacker-controlled webhook.web site URL. All of the recognized shortcomings have been remediated by Cursor in model 1.3.
Information of varied vulnerabilities in Cursor comes as Tracebit devised an assault focusing on Google’s Gemini CLI, an open-source command-line instrument fine-tuned for coding duties, that exploited a default configuration of the instrument to surreptitiously exfiltrate delicate knowledge to an attacker-controlled server utilizing curl.
Like noticed within the case of Cursor, the assault requires the sufferer to (1) instruct Gemini CLI to work together with an attacker-created GitHub codebase containing a nefarious oblique immediate injection within the GEMINI.md context file and (2) add a benign command to an allowlist (e.g., grep).
“Immediate injection focusing on these components, along with vital validation and show points inside Gemini CLI might trigger undetectable arbitrary code execution,” Tracebit founder and CTO Sam Cox stated.
To mitigate the chance posed by the assault, Gemini CLI customers are suggested to improve their installations to model 0.1.14 shipped on July 25, 2025.

The Hacker News Tags:Allowing, Attackers, Code, Commands, Cursor, Editor, Fixed, Flaw, Injection, Prompt, Run

Post navigation

Previous Post: In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
Next Post: Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers

Related Posts

Secure Vibe Coding: The Complete New Guide The Hacker News
Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack The Hacker News
U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million The Hacker News
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News