Cursor is a code editor built for programming with AI. Versions 1.6.23 and below contain case-sensitive checks in the way Cursor IDE protects its sensitive files (e.g., */.cursor/mcp.json), which allows attackers to modify the content of these files through prompt injection and achieve remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive fileystems. This issue is fixed in version 1.7.
History

Fri, 03 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Oct 2025 20:30:00 +0000

Type Values Removed Values Added
Description Cursor is a code editor built for programming with AI. Versions 1.6.23 and below contain case-sensitive checks in the way Cursor IDE protects its sensitive files (e.g., */.cursor/mcp.json), which allows attackers to modify the content of these files through prompt injection and achieve remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive fileystems. This issue is fixed in version 1.7.
Title Cursor IDE: Sensitive File Overwrite Bypass is Possible
Weaknesses CWE-178
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-03T20:43:03.394Z

Reserved: 2025-09-23T14:33:49.505Z

Link: CVE-2025-59944

cve-icon Vulnrichment

Updated: 2025-10-03T20:42:39.751Z

cve-icon NVD

Status : Received

Published: 2025-10-03T21:15:34.913

Modified: 2025-10-03T21:15:34.913

Link: CVE-2025-59944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.