CVE-2025-64106
📋 TL;DR
This vulnerability in Cursor code editor allows attackers to execute arbitrary commands on a victim's system by tricking them into clicking a malicious deep link. The flaw bypasses security warnings and hides executed commands from users. All users of Cursor versions 1.7.28 and below are affected.
💻 Affected Systems
- Cursor
📦 What is this software?
Cursor by Anysphere
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary commands with user privileges, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Attackers execute limited commands to steal sensitive data, install malware, or pivot to other systems within the network.
If Mitigated
User awareness prevents clicking malicious links, limiting impact to isolated incidents with minimal data exposure.
🎯 Exploit Status
Exploitation requires social engineering to get users to click malicious links but technical execution is straightforward once link is clicked.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.29 or later
Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-4575-fh42-7848
Restart Required: Yes
Instructions:
1. Open Cursor editor
2. Go to Settings > About
3. Check for updates
4. Install version 1.7.29 or later
5. Restart Cursor
🔧 Temporary Workarounds
Disable MCP Server Installation
allPrevent MCP server installation via deep links
Not applicable - requires configuration change in Cursor settings
Use Browser Link Protection
allConfigure browser to warn about or block cursor:// protocol links
Browser-specific configuration required
🧯 If You Can't Patch
- Train users to never click cursor:// links from untrusted sources
- Implement network filtering to block or alert on cursor:// protocol traffic
🔍 How to Verify
Check if Vulnerable:
Check Cursor version in Settings > About. If version is 1.7.28 or below, you are vulnerable.
Check Version:
Cursor does not provide CLI version check. Use GUI: Settings > About
Verify Fix Applied:
Verify Cursor version is 1.7.29 or later in Settings > About.
📡 Detection & Monitoring
Log Indicators:
- Unusual cursor:// protocol activations in system logs
- Unexpected command execution from Cursor process
Network Indicators:
- cursor:// protocol traffic to external domains
- Unexpected outbound connections after cursor:// link activation
SIEM Query:
process_name:"Cursor" AND (cmdline:"cursor://" OR parent_cmdline:"cursor://")