Indeterminate Code Execution Risk in Cursor Code Editor by Cursor
CVE-2026-31854

8.7HIGH

Key Information:

Vendor

Cursor

Status
Vendor
CVE Published:
11 March 2026

What is CVE-2026-31854?

Cursor is a code editor designed for programming with AI, which prior to version 2.0 contained a vulnerability that could lead to indirect prompt injections. This occurs when a compromised website delivers crafted instructions that the code editor might interpret as valid commands. If the command whitelist mechanism is bypassed, the code editor may execute these commands automatically, presenting a considerable security threat. The vulnerability has been addressed and fixed in version 2.0, safeguarding users from these risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

cursor < 2.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.