Cursor AI Programming Tool Hit by Critical 8.6 Severity Vulnerability - Remote Code Execution Flaw Affects All Versions

A major security vulnerability has been discovered in Cursor, the popular AI-powered programming tool that has developers “addicted” to its capabilities. The critical flaw, dubbed CurXecute vulnerability (CVE-2025-54135), affects virtually all versions of the platform and carries a severe 8.6 security rating.

Cursor Releases Emergency Version 1.3 Security Update

Cursor’s development team has responded swiftly by releasing version 1.3 to patch this critical security hole. The company is strongly urging all developers to upgrade immediately to protect against potential attacks.

How the CurXecute Vulnerability Works

The CVE-2025-54135 vulnerability enables attackers to exploit Cursor’s AI agent through malicious prompt injection techniques. Once compromised, attackers can:

  • Execute arbitrary remote commands
  • Gain developer-level system privileges
  • Manipulate project files and directories

Attack Method Similar to Microsoft 365 Copilot Flaw

Security researchers note that this Cursor AI security vulnerability shares similarities with the “EchoLeak” vulnerability previously found in Microsoft 365 Copilot. The attack vector involves:

  1. External service injection - Attackers use externally hosted services to inject malicious prompts
  2. File manipulation - The attack targets and corrupts the mcp.json file in project directories
  3. Remote code execution - This manipulation enables arbitrary command execution on the victim’s system

Rapid Response Timeline

The security disclosure timeline demonstrates responsible vulnerability reporting:

  • July 7: Security researchers privately reported the vulnerability
  • July 8: Cursor team merged the security patch into the main branch
  • Current: Official security advisory published with 8.6 severity rating

Critical Action Required for Cursor Users

Cursor has classified this as a moderate to high severity vulnerability and issued an urgent security bulletin. All users must:

  • Update to Cursor version 1.3 immediately
  • Check current version and upgrade if running older builds
  • Review recent project activities for any suspicious modifications

This Cursor AI vulnerability represents a significant security risk for developers using the platform. The availability of the patch in version 1.3 makes immediate updating the top priority for maintaining secure development environments.