Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When users click malicious `cursor://anysphere.cursor-deeplink/mcp/install` links, the installation dialog does not show the arguments being passed to the command being run. If a user clicks a malicious deeplink, then examines the installation dialog and clicks through, the full command including the arguments will be executed on the machine. This is fixed in version 1.3.
CVSS
No CVSS.
References
Configurations
No configuration.
History
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Aug 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-02 00:15
Updated : 2025-08-04 15:06
NVD link : CVE-2025-54133
Mitre link : CVE-2025-54133
CVE.ORG link : CVE-2025-54133
JSON object : View
Products Affected
No product.