CVE-2025-64107
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
04/11/2025
Last modified:
10/11/2025
Description
Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:anysphere:cursor:*:*:*:*:*:windows:*:* | 2.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



