AI Code Editor Compromised: Cursor IDE Flaw Opens Door to Remote Attacks

A significant security flaw, tracked as CVE-2025-54135 and dubbed “CurXecute,” was discovered in the popular AI-powered code editor, Cursor IDE. This high-severity vulnerability (CVSS Score: 8.6) allows attackers to achieve Remote Code Execution (RCE) on a developer’s machine without requiring the user to approve or accept any malicious changes.

Details of the Vulnerability

  • Flaw: The vulnerability exploits Cursor’s Model Context Protocol (MCP) auto-start feature, which automatically executes new entries added to the ~/.cursor/mcp.json configuration file.
  • Attack Vector: When a developer connects Cursor to external services (like Slack or GitHub) via an MCP server and then uses the AI agent to process untrusted external data (such as summarizing messages), a sophisticated prompt injection attack can occur.
  • Execution: The malicious prompt tricks the AI agent into directly modifying the mcp.json file. Crucially, Cursor IDE writes these suggested edits to the disk and the MCP auto-start feature executes the embedded command immediately, achieving RCE before the user can review or reject the AI’s suggestion.
  • Impact: Successful exploitation grants attackers developer-level privileges, enabling potential data theft, ransomware deployment, or complete system compromise.

Mitigation

The vulnerability affects all Cursor IDE versions prior to 1.3. Developers are strongly advised to:

  1. Update Immediately to Cursor IDE version 1.3 or later, which contains the fix.
  2. Review MCP Configurations to minimize exposure to untrusted external data sources.

This incident highlights a growing security challenge for AI development tools that integrate local systems with external, untrusted content sources.

Comments

Leave a comment