CVE-2025-54133

9.6 CRITICAL

📋 TL;DR

Cursor code editor versions 1.17 through 1.2 contain a UI information disclosure vulnerability in the MCP deeplink handler that allows attackers to execute arbitrary system commands through social engineering. Users who click malicious cursor:// links and proceed through installation dialogs can have commands executed on their machines. This affects all users running vulnerable versions of Cursor.

💻 Affected Systems

Products:
  • Cursor
Versions: 1.17 through 1.2
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the vulnerable version range are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary command execution, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attackers trick users into clicking malicious links via phishing/social engineering, then execute commands to steal credentials, install malware, or exfiltrate sensitive data.

🟢

If Mitigated

Limited impact if users are trained to avoid suspicious links and proper endpoint security controls are in place to detect malicious command execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (2 clicks) but is straightforward once a malicious link is crafted and delivered via social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3

Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-r22h-5wp2-2wfv

Restart Required: Yes

Instructions:

1. Open Cursor editor. 2. Go to Settings/About. 3. Check current version. 4. If below 1.3, update to version 1.3 or higher through built-in update mechanism or download from official source. 5. Restart Cursor after update.

🔧 Temporary Workarounds

Disable deeplink protocol handler

all

Remove or disable the cursor:// protocol handler registration in your operating system

Windows: reg delete HKCU\Software\Classes\cursor /f
macOS: defaults delete com.todesktop.230313mzl
Linux: Check ~/.config/mimeapps.list and remove cursor:// entries

Use web browser link warnings

all

Configure browsers to warn about or block cursor:// protocol links

🧯 If You Can't Patch

  • Train users to never click cursor:// links from untrusted sources
  • Implement application allowlisting to prevent execution of unauthorized commands

🔍 How to Verify

Check if Vulnerable:

Open Cursor, go to Settings/About, check if version is between 1.17 and 1.2 inclusive

Check Version:

Cursor shows version in About dialog; no CLI command available

Verify Fix Applied:

Confirm version is 1.3 or higher in Settings/About

📡 Detection & Monitoring

Log Indicators:

  • Process execution logs showing unexpected commands following cursor:// protocol activation
  • Security logs showing cursor:// protocol handler execution

Network Indicators:

  • Network connections initiated by Cursor to unexpected destinations following link clicks

SIEM Query:

Process execution where parent_process contains 'cursor' AND command_line contains suspicious patterns

🔗 References

📤 Share & Export