CVE-2025-64110

Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore file which can invalidate the configuration of pre-existing ones. This could allow a malicious agent to read protected files. This issue is fixed in version 2.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:*

History

07 Nov 2025, 13:04

Type Values Removed Values Added
First Time Anysphere cursor
Anysphere
References () https://github.com/cursor/cursor/security/advisories/GHSA-vhc2-fjv4-wqch - () https://github.com/cursor/cursor/security/advisories/GHSA-vhc2-fjv4-wqch - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:*

05 Nov 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-05 00:15

Updated : 2025-11-07 13:04


NVD link : CVE-2025-64110

Mitre link : CVE-2025-64110

CVE.ORG link : CVE-2025-64110


JSON object : View

Products Affected

anysphere

  • cursor
CWE
CWE-284

Improper Access Control