Home

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

PUBLISHED Reserved 2025-10-27 | Published 2025-11-04 | Updated 2025-11-07 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 2.0
affected

References

github.com/...cursor/security/advisories/GHSA-6r98-6qcw-rxrw

cve.org (CVE-2025-64108)

nvd.nist.gov (CVE-2025-64108)

Download JSON