VYPR
Unrated severityNVD Advisory· Published Mar 11, 2026· Updated Mar 11, 2026

Cursor Affected by Arbitrary Code Execution via Prompt Injection and Whitelist Bypass

CVE-2026-31854

Description

Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visited website contains maliciously crafted instructions, the model may attempt to follow them in order to “assist” the user. When combined with a bypass of the command whitelist mechanism, such indirect prompt injections could result in commands being executed automatically, without the user’s explicit intent, thereby posing a significant security risk. This vulnerability is fixed in 2.0.

Affected products

1
  • cursor/cursorv5
    Range: < 2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.