We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49150

Cursor Agent Potentially Leaks Information using JSON schema



Description

Cursor is a code editor built for programming with AI. Prior to 0.51.0, by default, the setting json.schemaDownload.enable was set to True. This means that by writing a JSON file, an attacker can trigger an arbitrary HTTP GET request that does not require user confirmation. Since the Cursor Agent can edit JSON files, this means a malicious agent, for example, after a prompt injection attack already succeeded, could trigger a GET request to an attacker controlled URL, potentially exfiltrating other data the agent may have access to. This vulnerability is fixed in 0.51.0.

Reserved 2025-06-02 | Published 2025-06-11 | Updated 2025-06-11 | Assigner GitHub_M


MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 0.51.0
affected

References

github.com/...cursor/security/advisories/GHSA-9h3v-h59j-v6rj

cve.org (CVE-2025-49150)

nvd.nist.gov (CVE-2025-49150)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49150

Support options

Helpdesk Chat, Email, Knowledgebase