Metrics
Affected Vendors & Products
Mon, 25 Aug 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Anysphere
Anysphere cursor |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:* | |
Vendors & Products |
Anysphere
Anysphere cursor |
|
Metrics |
cvssV3_1
|
Mon, 04 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cursor
Cursor cursor |
|
Vendors & Products |
Cursor
Cursor cursor |
Fri, 01 Aug 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When users click malicious `cursor://anysphere.cursor-deeplink/mcp/install` links, the installation dialog does not show the arguments being passed to the command being run. If a user clicks a malicious deeplink, then examines the installation dialog and clicks through, the full command including the arguments will be executed on the machine. This is fixed in version 1.3. | |
Title | Cursor's MCP Install Deeplink Does Not Show Arguments in its User-Dialog | |
Weaknesses | CWE-200 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-04T17:17:06.179Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54133

Updated: 2025-08-04T17:17:01.333Z

Status : Analyzed
Published: 2025-08-02T00:15:25.050
Modified: 2025-08-25T01:46:04.600
Link: CVE-2025-54133

No data.

Updated: 2025-08-04T08:15:52Z