Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

Posted on August 4, 2025August 4, 2025 By CWS

A extreme vulnerability within the well-liked AI-powered code editor Cursor IDE, dubbed “CurXecute,” permits attackers to execute arbitrary code on builders’ machines with none person interplay. 

The vulnerability, tracked as CVE-2025-54135 with a excessive severity rating of 8.6, impacts all Cursor IDE variations previous to 1.3 and has been efficiently patched following accountable disclosure.

Key Takeaways1.”CurXecute” in Cursor IDE permits distant code execution with out person interplay.2. Malicious prompts through exterior companies exploit MCP auto-start to execute arbitrary instructions.3. Replace instantly and assessment MCP.

The flaw exploits Cursor’s Mannequin Context Protocol (MCP) auto-start performance, which robotically executes new entries added to the ~/.cursor/mcp.json configuration file. 

This mechanism, mixed with the IDE’s recommended edits function, creates a harmful assault vector the place malicious prompts can set off distant code execution earlier than customers have any alternative to assessment or approve the modifications.

AI-Powered Code Editor Cursor IDE Vulnerability

The vulnerability operates by means of a classy immediate injection assault that leverages Cursor’s integration with exterior MCP servers. 

When builders join Cursor to third-party companies like Slack, GitHub, or databases by means of MCP, the IDE turns into uncovered to untrusted exterior information that may manipulate the agent’s management move.

The assault sequence begins when an attacker posts a crafted message in a public channel accessible by means of an MCP server. When a sufferer queries Cursor to summarize messages utilizing the related service, the malicious payload convinces the AI agent to change the mcp.json file. 

A typical injection would possibly embrace code comparable to:

The essential flaw lies in Cursor’s habits of writing recommended edits on to disk, triggering computerized command execution by means of the MCP auto-start function even earlier than customers can settle for or reject the suggestion. 

This allows attackers to execute instructions like contact ~/mcp_rce with developer-level privileges, probably resulting in information theft, ransomware deployment, or full system compromise.

Danger FactorsDetailsAffected ProductsCursor IDE (all variations previous to 1.3)ImpactRemote Code Execution (RCE)Exploit Stipulations– Goal system operating susceptible Cursor IDE model– MCP server configured with exterior information entry– Attacker potential to inject malicious content material into exterior information supply– Consumer interplay with AI agent to course of exterior dataCVSS 3.1 Score8.6 (Excessive)

Repair Out there

This vulnerability highlights a basic safety problem inherent in AI-powered growth instruments that bridge exterior and native computing environments. 

As Purpose Labs famous of their evaluation, any third-party MCP server processing exterior content material turns into a possible assault floor, together with difficulty trackers, buyer help programs, and engines like google.

Cursor has responded promptly to the disclosure, releasing model 1.3 with applicable fixes. 

Builders are strongly suggested to replace instantly and assessment their MCP server configurations to attenuate publicity to untrusted exterior information sources.

The invention builds upon earlier analysis by researchers, together with their June disclosure of “EchoLeak,” which demonstrated comparable immediate injection vulnerabilities in Microsoft 365 Copilot. 

These incidents underscore the rising want for sturdy runtime guardrails in AI agent architectures, as conventional safety fashions might show inadequate when exterior context can immediately affect agent habits and privilege utilization.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:AIPowered, Code, CursorIDE, Editor, Enables, Interaction, Remote, Vulnerability, WithoutUser

Post navigation

Previous Post: NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine
Next Post: The Wild West of Shadow IT

Related Posts

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System Cyber Security News
Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cyber Security News
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications Cyber Security News
Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark