Home

Description

Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore file which can invalidate the configuration of pre-existing ones. This could allow a malicious agent to read protected files. This issue is fixed in version 2.0.

PUBLISHED Reserved 2025-10-27 | Published 2025-11-04 | Updated 2025-11-07 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

Product status

< 2.0
affected

References

github.com/...cursor/security/advisories/GHSA-vhc2-fjv4-wqch

cve.org (CVE-2025-64110)

nvd.nist.gov (CVE-2025-64110)

Download JSON