CVE-2026-26268
📋 TL;DR
This CVE describes a sandbox escape vulnerability in Cursor code editor versions prior to 2.5. A malicious AI agent could write to improperly protected .git configuration files, potentially leading to remote code execution when Git automatically executes hooks. All users of Cursor versions before 2.5 are affected.
💻 Affected Systems
- Cursor AI Code Editor
📦 What is this software?
Cursor by Anysphere
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via remote code execution when Git hooks trigger, allowing attacker to execute arbitrary commands on the host system.
Likely Case
Local file system manipulation and potential privilege escalation within the user's environment.
If Mitigated
Limited to sandboxed environment with no access to host system or critical resources.
🎯 Exploit Status
Exploitation requires malicious AI agent interaction but no user authentication. Git automatically executes hooks without user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5
Vendor Advisory: https://github.com/cursor/cursor/security/advisories/GHSA-8pcm-8jpx-hv8r
Restart Required: Yes
Instructions:
1. Open Cursor editor 2. Go to Settings > About 3. Check for updates 4. Install version 2.5 or later 5. Restart Cursor
🔧 Temporary Workarounds
Disable Git Hooks
allPrevent Git from automatically executing hooks by disabling hook execution globally
git config --global core.hooksPath /dev/null
Restrict Git Configuration
linuxSet Git configuration to read-only for Cursor processes
chmod -R a-w ~/.gitconfig
chmod -R a-w .git
🧯 If You Can't Patch
- Disable AI agent functionality in Cursor settings
- Use Cursor in isolated container or VM without host system access
🔍 How to Verify
Check if Vulnerable:
Check Cursor version in Settings > About. If version is less than 2.5, system is vulnerable.
Check Version:
In Cursor: Help > About or Settings > About
Verify Fix Applied:
Confirm Cursor version is 2.5 or higher in Settings > About and verify .git directory permissions are properly restricted.
📡 Detection & Monitoring
Log Indicators:
- Unexpected .git configuration file modifications
- Git hook execution from Cursor process
- Unusual file writes to .git directories
Network Indicators:
- Outbound connections from Cursor to unexpected destinations after Git operations
SIEM Query:
process_name:"Cursor" AND file_path:"*.git*" AND action:"write"