Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32311 | Cursor is a code editor built for programming with AI. In versions 1.7 and below, automatic loading of project-specific CLI configuration from the current working directory (<project>/.cursor/cli.json) could override certain global configurations in Cursor CLI. This allowed users running the CLI inside a malicious repository to be vulnerable to Remote Code Execution through a combination of permissive configuration (allowing shell commands) and prompt injection delivered via project-specific Rules (<project>/.cursor/rules/rule.mdc) or other mechanisms. The fix for this issue is currently available as a patch 2025.09.17-25b418f. As of October 3, 2025 there is no release version. |
Thu, 09 Oct 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anysphere
Anysphere cursor |
|
| CPEs | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anysphere
Anysphere cursor |
Mon, 06 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cursor
Cursor cursor |
|
| Vendors & Products |
Cursor
Cursor cursor |
Fri, 03 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cursor is a code editor built for programming with AI. In versions 1.7 and below, automatic loading of project-specific CLI configuration from the current working directory (<project>/.cursor/cli.json) could override certain global configurations in Cursor CLI. This allowed users running the CLI inside a malicious repository to be vulnerable to Remote Code Execution through a combination of permissive configuration (allowing shell commands) and prompt injection delivered via project-specific Rules (<project>/.cursor/rules/rule.mdc) or other mechanisms. The fix for this issue is currently available as a patch 2025.09.17-25b418f. As of October 3, 2025 there is no release version. | |
| Title | Cursor CLI: Arbitrary Code Execution Possible through Permissive CLI Config | |
| Weaknesses | CWE-829 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-03T18:29:26.868Z
Reserved: 2025-09-26T16:25:25.150Z
Link: CVE-2025-61592
Updated: 2025-10-03T18:29:22.343Z
Status : Analyzed
Published: 2025-10-03T18:15:36.067
Modified: 2025-10-09T17:23:11.983
Link: CVE-2025-61592
No data.
OpenCVE Enrichment
Updated: 2025-10-06T14:42:43Z
EUVD