Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
History

Fri, 07 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Cursor
Cursor cursor
Vendors & Products Cursor
Cursor cursor

Tue, 04 Nov 2025 23:15:00 +0000

Type Values Removed Values Added
Description Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
Title Cursor's Sensitive File Modification can Lead to NTFS Path Quirks
Weaknesses CWE-22
CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-04T22:58:53.745Z

Updated: 2025-11-07T14:26:51.902Z

Reserved: 2025-10-27T15:26:14.127Z

Link: CVE-2025-64108

cve-icon Vulnrichment

Updated: 2025-11-05T14:20:24.936Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-04T23:15:44.470

Modified: 2025-11-06T19:45:30.990

Link: CVE-2025-64108

cve-icon Redhat

No data.