Unauthorized File Creation Vulnerability in Cursor Code Editor by Cursor
CVE-2025-54135
Key Information:
Badges
What is CVE-2025-54135?
CVE-2025-54135 is a vulnerability identified in the Cursor code editor, a platform designed for programming in conjunction with AI tools. This vulnerability stems from an unauthorized file creation issue present in versions prior to 1.3.9, allowing the application to write workspace files without requiring user consent. Specifically, while the editing of existing dotfiles necessitates approval, the creation of new dotfiles can be executed without this safeguard. If an attacker exploits this flaw, they could manipulate indirect prompt injection vulnerabilities to gain unauthorized access, enabling them to write sensitive configuration files such as .cursor/mcp.json
. Such actions could ultimately result in remote code execution (RCE) on the user's system, posing severe risks to organizational integrity and security.
Potential impact of CVE-2025-54135
-
Unauthorized File Manipulation: Attackers could create sensitive configuration files without user consent, compromising the integrity of the workspace and potentially exposing the user to further vulnerabilities.
-
Remote Code Execution: By leveraging the unauthorized file creation capability, threat actors could execute arbitrary code on the victim's machine, leading to system compromise and unauthorized control over affected devices.
-
Increased Attack Surface: The ease of exploiting this vulnerability expands the risk landscape for organizations, potentially allowing broader access for malicious actors, especially if other vulnerabilities present in the environment are exploited in conjunction.
Affected Version(s)
cursor < 1.3.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles

Cursor IDE Vulnerability Allows Remote Code Execution Without User Interaction - Cyber Security News
Security researchers at Aim Labs have uncovered a high-severity vulnerability dubbed “CurXecute” in the widely used Cursor IDE, enabling attackers to achieve full remote code execution through a sophisticated prompt injection attack. The vulnerability, tracked as CVE-2025-54135 with a severity ratin...
4 days ago
Cursor flaw risks RCE from prompt injections on MCP server, researchers say
An attacker could cause Cursor to make changes to the mcp.json configuration file, says Aim Security.
4 days ago
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📈
Vulnerability started trending
Vulnerability published
- 📰
First article discovered by SC Media