CVE-2025-64108

8.8 HIGH

📋 TL;DR

This CVE describes a path traversal vulnerability in Cursor AI code editor that allows attackers to bypass sensitive file protections via NTFS path quirks. When chained with prompt injection or malicious model attacks, it can lead to arbitrary file overwrites and potentially remote code execution. Only affects Cursor users on NTFS-supported systems (primarily Windows) running vulnerable versions.

💻 Affected Systems

Products:
  • Cursor AI Code Editor
Versions: 1.7.44 and below
Operating Systems: Windows (NTFS systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when chained with prompt injection or malicious model attacks. Linux/macOS systems not affected unless using NTFS volumes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution through modification of protected files, potentially leading to full system compromise.

🟠

Likely Case

Unauthorized file overwrites in Cursor's protected directories, potentially corrupting configuration or enabling further attacks.

🟢

If Mitigated

Limited impact if prompt injection vectors are blocked and file permissions are properly configured.

🌐 Internet-Facing: MEDIUM - Requires chaining with prompt injection which typically requires user interaction or malicious model access.
🏢 Internal Only: HIGH - Internal attackers with access to prompt injection vectors could exploit this to escalate privileges or compromise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires chaining with prompt injection attack, which adds complexity. NTFS path quirks knowledge required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0

Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-6r98-6qcw-rxrw

Restart Required: Yes

Instructions:

1. Open Cursor editor. 2. Go to Settings > About. 3. Check current version. 4. If below 2.0, download and install version 2.0 from official Cursor website. 5. Restart Cursor after installation.

🔧 Temporary Workarounds

Disable AI features temporarily

all

Disable Cursor's AI features to prevent prompt injection vectors

Not applicable - use Cursor settings UI

Restrict file permissions

windows

Set stricter permissions on Cursor configuration directories

icacls "%APPDATA%\Cursor" /deny Users:(OI)(CI)(W,R,X)
icacls "%LOCALAPPDATA%\Cursor" /deny Users:(OI)(CI)(W,R,X)

🧯 If You Can't Patch

  • Monitor for suspicious file modifications in Cursor directories
  • Implement application allowlisting to prevent unauthorized Cursor execution

🔍 How to Verify

Check if Vulnerable:

Check Cursor version in Settings > About. If version is 1.7.44 or lower, system is vulnerable.

Check Version:

cursor --version (if installed via command line) or check in Settings > About in UI

Verify Fix Applied:

After updating, verify version shows 2.0 or higher in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in Cursor directories
  • Multiple failed file access attempts to protected paths

Network Indicators:

  • Unusual outbound connections from Cursor process

SIEM Query:

Process:Name='Cursor.exe' AND FilePath CONTAINS '..' OR FilePath CONTAINS ':'

🔗 References

📤 Share & Export