Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visited website contains maliciously crafted instructions, the model may attempt to follow them in order to “assist” the user. When combined with a bypass of the command whitelist mechanism, such indirect prompt injections could result in commands being executed automatically, without the user’s explicit intent, thereby posing a significant security risk. This vulnerability is fixed in 2.0.
References
| Link | Resource |
|---|---|
| https://github.com/cursor/cursor/security/advisories/GHSA-hf2x-r83r-qw5q | Vendor Advisory |
Configurations
History
20 Mar 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
| References | () https://github.com/cursor/cursor/security/advisories/GHSA-hf2x-r83r-qw5q - Vendor Advisory | |
| First Time |
Anysphere cursor
Anysphere |
|
| Summary |
|
11 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 17:16
Updated : 2026-03-20 16:34
NVD link : CVE-2026-31854
Mitre link : CVE-2026-31854
CVE.ORG link : CVE-2026-31854
JSON object : View
Products Affected
anysphere
- cursor
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
