Address
33-17, Q Sentral.
2A, Jalan Stesen Sentral 2, Kuala Lumpur Sentral,
50470 Federal Territory of Kuala Lumpur
Contact
+603-2701-3606
info@linkdood.com
Address
33-17, Q Sentral.
2A, Jalan Stesen Sentral 2, Kuala Lumpur Sentral,
50470 Federal Territory of Kuala Lumpur
Contact
+603-2701-3606
info@linkdood.com

In a startling revelation, the popular AI-powered coding assistant Cursor was found vulnerable to a flaw that could’ve let attackers silently run commands on developers’ machines—all without a single warning prompt.
This incident is more than just a technical slip—it’s a cautionary tale about the hidden dangers of AI-integrated development tools.

A critical vulnerability, now tracked as CVE‑2025‑54135 (aka “CurXecute”), was uncovered in Cursor’s Model Control Protocol (MCP). This AI assistant, built directly into the developer’s IDE, was unintentionally exposing a backdoor through its mcp.json configuration file.
All it took was a malicious MCP server reference—hidden in a chat, commit, or Slack message—for Cursor’s agent to execute attacker-supplied code locally. No user confirmation. No warning. Just… execute.
The risk was amplified because Cursor, like many dev tools, operates with elevated privileges and direct access to project directories.
On July 29, 2025, Cursor released version 1.3, which introduces:
If you haven’t updated yet—do it now.
Prompt injection is the new buffer overflow. It tricks an AI into executing unintended behaviors, and in this case, it was potentially catastrophic.
While the vulnerability exploited configuration rather than model logic, the entry point was still the AI agent—which acted on input without verifying source integrity. This is part of a growing trend in AI-powered dev tools: smarter, faster… but also more fragile.
~/.cursor/mcp.json fileQ: Is Cursor still safe to use?
Yes—if you’re on the latest version and avoid unknown sources. The flaw is patched and now requires user confirmation for risky actions.
Q: How was this discovered?
Ethical hackers at Aim Labs found the issue and reported it through responsible disclosure channels.
Q: Could this have been exploited in the wild?
There’s no public evidence of active exploitation, but the simplicity of the vector means it’s possible.
Q: Is this a Cursor-only problem?
No. Prompt injection and configuration-based attacks are emerging risks across all AI-assisted dev tools, including GitHub Copilot, Cody, and others.
Q: What’s next?
Expect AI tooling platforms to move toward more restrictive sandboxing, structured prompt formats, and advanced validation layers.
AI-powered dev tools like Cursor promise incredible productivity—but also invite entirely new categories of risk. The “CurXecute” flaw is a wake-up call that smart tools need smarter security.
Let this be a reminder: If the AI can code for you, it can also be tricked into coding against you. Stay updated, stay vigilant, and never trust a prompt blindly.

Sources The Hacker News