CVE-2025-64108
📋 TL;DR
This CVE describes a path traversal vulnerability in Cursor AI code editor that allows attackers to bypass sensitive file protections via NTFS path quirks. When chained with prompt injection or malicious model attacks, it can lead to arbitrary file overwrites and potentially remote code execution. Only affects Cursor users on NTFS-supported systems (primarily Windows) running vulnerable versions.
💻 Affected Systems
- Cursor AI Code Editor
📦 What is this software?
Cursor by Anysphere
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution through modification of protected files, potentially leading to full system compromise.
Likely Case
Unauthorized file overwrites in Cursor's protected directories, potentially corrupting configuration or enabling further attacks.
If Mitigated
Limited impact if prompt injection vectors are blocked and file permissions are properly configured.
🎯 Exploit Status
Requires chaining with prompt injection attack, which adds complexity. NTFS path quirks knowledge required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0
Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-6r98-6qcw-rxrw
Restart Required: Yes
Instructions:
1. Open Cursor editor. 2. Go to Settings > About. 3. Check current version. 4. If below 2.0, download and install version 2.0 from official Cursor website. 5. Restart Cursor after installation.
🔧 Temporary Workarounds
Disable AI features temporarily
allDisable Cursor's AI features to prevent prompt injection vectors
Not applicable - use Cursor settings UI
Restrict file permissions
windowsSet stricter permissions on Cursor configuration directories
icacls "%APPDATA%\Cursor" /deny Users:(OI)(CI)(W,R,X)
icacls "%LOCALAPPDATA%\Cursor" /deny Users:(OI)(CI)(W,R,X)
🧯 If You Can't Patch
- Monitor for suspicious file modifications in Cursor directories
- Implement application allowlisting to prevent unauthorized Cursor execution
🔍 How to Verify
Check if Vulnerable:
Check Cursor version in Settings > About. If version is 1.7.44 or lower, system is vulnerable.
Check Version:
cursor --version (if installed via command line) or check in Settings > About in UI
Verify Fix Applied:
After updating, verify version shows 2.0 or higher in Settings > About.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations in Cursor directories
- Multiple failed file access attempts to protected paths
Network Indicators:
- Unusual outbound connections from Cursor process
SIEM Query:
Process:Name='Cursor.exe' AND FilePath CONTAINS '..' OR FilePath CONTAINS ':'