A major security vulnerability has been discovered in Cursor, the popular AI-powered programming tool that has developers “addicted” to its capabilities. The critical flaw, dubbed CurXecute vulnerability (CVE-2025-54135), affects virtually all versions of the platform and carries a severe 8.6 security rating.
Cursor Releases Emergency Version 1.3 Security Update
Cursor’s development team has responded swiftly by releasing version 1.3 to patch this critical security hole. The company is strongly urging all developers to upgrade immediately to protect against potential attacks.
How the CurXecute Vulnerability Works
The CVE-2025-54135 vulnerability enables attackers to exploit Cursor’s AI agent through malicious prompt injection techniques. Once compromised, attackers can:
- Execute arbitrary remote commands
- Gain developer-level system privileges
- Manipulate project files and directories
Attack Method Similar to Microsoft 365 Copilot Flaw
Security researchers note that this Cursor AI security vulnerability shares similarities with the “EchoLeak” vulnerability previously found in Microsoft 365 Copilot. The attack vector involves:
- External service injection - Attackers use externally hosted services to inject malicious prompts
- File manipulation - The attack targets and corrupts the
mcp.jsonfile in project directories - Remote code execution - This manipulation enables arbitrary command execution on the victim’s system
Rapid Response Timeline
The security disclosure timeline demonstrates responsible vulnerability reporting:
- July 7: Security researchers privately reported the vulnerability
- July 8: Cursor team merged the security patch into the main branch
- Current: Official security advisory published with 8.6 severity rating
Critical Action Required for Cursor Users
Cursor has classified this as a moderate to high severity vulnerability and issued an urgent security bulletin. All users must:
- Update to Cursor version 1.3 immediately
- Check current version and upgrade if running older builds
- Review recent project activities for any suspicious modifications
This Cursor AI vulnerability represents a significant security risk for developers using the platform. The availability of the patch in version 1.3 makes immediate updating the top priority for maintaining secure development environments.