cursor News Articles

Recent news articles refferecing the vendors vulnerabilities.

New 'MCPoison' Attack Exploits Cursor IDE Validation to Run Arbitrary System Commands

Security researchers from Check Point have disclosed a critical vulnerability in Cursor IDE that allows attackers to achieve persistent remote code execution through a Model Context Protocol (MCP) trust bypass mechanism. The flaw, designated CVE-2025-54136, exploits the IDE’s one-time approval syste...

MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands

Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute arbitrary system commands through a sophisticated trust bypass mechanism, potentially compromising developer workstations across collaborative coding environments. Check Point Research di...

Cursor IDE Vulnerability Allows Remote Code Execution Without User Interaction - Cyber Security News

Security researchers at Aim Labs have uncovered a high-severity vulnerability dubbed “CurXecute” in the widely used Cursor IDE, enabling attackers to achieve full remote code execution through a sophisticated prompt injection attack. The vulnerability, tracked as CVE-2025-54135 with a severity ratin...

Cursor flaw risks RCE from prompt injections on MCP server, researchers say

An attacker could cause Cursor to make changes to the mcp.json configuration file, says Aim Security.

No more news articles to load.