CVE-2025-54130
- EPSS 0.06%
- Veröffentlicht 05.08.2025 00:12:28
- Zuletzt bearbeitet 25.08.2025 01:38:42
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensit...
CVE-2025-54135
- EPSS 0.07%
- Veröffentlicht 05.08.2025 00:11:07
- Zuletzt bearbeitet 25.08.2025 01:36:47
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive ...
CVE-2025-54131
- EPSS 0.05%
- Veröffentlicht 01.08.2025 23:15:24
- Zuletzt bearbeitet 25.08.2025 01:53:54
Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every t...
CVE-2025-54132
- EPSS 0.06%
- Veröffentlicht 01.08.2025 23:15:24
- Zuletzt bearbeitet 25.08.2025 01:48:43
Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive infor...
CVE-2025-54136
- EPSS 0.1%
- Veröffentlicht 01.08.2025 23:08:21
- Zuletzt bearbeitet 25.08.2025 01:41:36
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the fil...
CVE-2025-54133
- EPSS 0.06%
- Veröffentlicht 01.08.2025 23:07:00
- Zuletzt bearbeitet 25.08.2025 01:46:04
Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system ...