CVE-2025-64109

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution in Cursor CLI Beta when a user clones a malicious GitHub repository containing a crafted .cursor/mcp.json file. Attackers can execute arbitrary commands on the victim's system without warning. All users of Cursor CLI Beta versions before 2025.09.17-25b418f are affected.

💻 Affected Systems

Products:
  • Cursor CLI Beta
Versions: All versions before 2025.09.17-25b418f
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Cursor CLI Beta, not the regular Cursor editor. Requires user to clone and open a malicious repository.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the victim's system allowing attacker to install malware, steal credentials, or pivot to other systems.

🟠

Likely Case

Attackers create malicious repositories that execute code when developers clone and open them with Cursor CLI, potentially stealing source code or credentials.

🟢

If Mitigated

Limited impact if users only clone trusted repositories and have updated to patched versions.

🌐 Internet-Facing: HIGH - Attackers can host malicious repositories on public GitHub.
🏢 Internal Only: MEDIUM - Risk exists if internal repositories are compromised or malicious actors have internal access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to get users to clone malicious repositories. The advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.09.17-25b418f

Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-4hwr-97q3-37w2

Restart Required: Yes

Instructions:

1. Update Cursor CLI Beta to version 2025.09.17-25b418f or later. 2. Restart Cursor CLI after update. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable MCP server auto-execution

all

Prevent automatic execution of MCP servers from .cursor/mcp.json files

cursor config set mcp.autoStart false

Use regular Cursor editor

all

Switch to the regular Cursor editor which is not affected by this vulnerability

🧯 If You Can't Patch

  • Only clone repositories from trusted sources and verify .cursor/mcp.json files before opening projects
  • Disable Cursor CLI Beta and use alternative tools until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check if Cursor CLI Beta version is older than 2025.09.17-25b418f

Check Version:

cursor --version

Verify Fix Applied:

Confirm version is 2025.09.17-25b418f or newer and test that malicious .cursor/mcp.json files no longer auto-execute

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Cursor CLI
  • Commands running from .cursor directories
  • Network connections to unexpected MCP servers

Network Indicators:

  • Outbound connections from Cursor to unexpected hosts on MCP server ports

SIEM Query:

process_name:"cursor" AND (command_line:"mcp" OR parent_process:"cursor")

🔗 References

📤 Share & Export