Unrated severityNVD Advisory· Published Nov 4, 2025· Updated Nov 7, 2025
Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows
CVE-2025-64107
Description
Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.
Affected products
2- cursor/cursorv5Range: < 2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/cursor/cursor/security/advisories/GHSA-2jr2-8wf5-v6pfmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.