Unrated severityNVD Advisory· Published Feb 13, 2026· Updated Feb 13, 2026
Cursor sandbox escape via Git hooks
CVE-2026-26268
Description
Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git hooks, which may cause out-of-sandbox RCE next time they are triggered. No user interaction was required as Git executes these commands automatically. Fixed in version 2.5.
Affected products
1- cursor/cursorv5Range: < 2.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/cursor/cursor/security/advisories/GHSA-8pcm-8jpx-hv8rmitrex_refsource_CONFIRM
News mentions
2- ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreThe Hacker News · May 4, 2026
- 4th May – Threat Intelligence ReportCheck Point Research · May 4, 2026