Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 07 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anysphere
Anysphere cursor |
|
| CPEs | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anysphere
Anysphere cursor |
|
| Metrics |
cvssV3_1
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cursor
Cursor cursor |
|
| Vendors & Products |
Cursor
Cursor cursor |
Tue, 04 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore file which can invalidate the configuration of pre-existing ones. This could allow a malicious agent to read protected files. This issue is fixed in version 2.0. | |
| Title | Cursor: Authentication Bypass Possible via New Cursorignore Write | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-07T14:26:39.262Z
Reserved: 2025-10-27T15:26:14.127Z
Link: CVE-2025-64110
Updated: 2025-11-05T14:20:22.919Z
Status : Analyzed
Published: 2025-11-05T00:15:34.957
Modified: 2025-11-07T13:04:09.867
Link: CVE-2025-64110
No data.
OpenCVE Enrichment
Updated: 2025-11-05T10:47:04Z