Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every terminal call) to an allowlist, an attacker can execute arbitrary command execution outside of the allowlist without user approval. An attacker can trigger this vulnerability if chained with indirect prompt injection. This is fixed in version 1.3.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cursor
Cursor cursor |
|
Vendors & Products |
Cursor
Cursor cursor |
Fri, 01 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every terminal call) to an allowlist, an attacker can execute arbitrary command execution outside of the allowlist without user approval. An attacker can trigger this vulnerability if chained with indirect prompt injection. This is fixed in version 1.3. | |
Title | Cursor bypasses its allow list to execute arbitrary commands | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-04T13:57:16.983Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54131

Updated: 2025-08-04T13:56:15.826Z

Status : Awaiting Analysis
Published: 2025-08-01T23:15:24.537
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-54131

No data.