Remote Code Execution Vulnerability in Cursor Code Editor by Cursor, Inc.
CVE-2025-64109
What is CVE-2025-64109?
A vulnerability in the Cursor CLI Beta allows attackers to execute remote code by exploiting the MCP (Model Context Protocol) server. By uploading a malicious configuration file in the '.cursor/mcp.json' path within a GitHub repository, an attacker can trigger code execution. When a victim clones the repository and launches it using the Cursor CLI, the malicious MCP server command is executed immediately without any prompts, exposing the system to potential risks. This issue has been addressed in the latest version, 2025.09.17-25b418f.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
cursor < 2025.09.17-25b418f
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
