Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23405 | Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.exe) without triggering any warning or re-prompt. If an attacker has write permissions on a user's active branches of a source repository that contains existing MCP servers the user has previously approved, or allows an attacker has arbitrary file-write locally, the attacker can achieve arbitrary code execution. This is fixed in version 1.3. |
Mon, 25 Aug 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anysphere
Anysphere cursor |
|
| CPEs | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anysphere
Anysphere cursor |
Mon, 04 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cursor
Cursor cursor |
|
| Vendors & Products |
Cursor
Cursor cursor |
Fri, 01 Aug 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.exe) without triggering any warning or re-prompt. If an attacker has write permissions on a user's active branches of a source repository that contains existing MCP servers the user has previously approved, or allows an attacker has arbitrary file-write locally, the attacker can achieve arbitrary code execution. This is fixed in version 1.3. | |
| Title | Cursor's Modification of MCP Server Definitions Bypasses Manual Re-approvals | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-04T17:16:42.841Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54136
Updated: 2025-08-04T17:16:38.537Z
Status : Analyzed
Published: 2025-08-02T00:15:25.290
Modified: 2025-08-25T01:41:36.580
Link: CVE-2025-54136
No data.
OpenCVE Enrichment
Updated: 2025-08-04T08:15:50Z
EUVD