Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 10 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anysphere
Anysphere cursor |
|
| CPEs | cpe:2.3:a:anysphere:cursor:*:*:*:*:*:windows:*:* | |
| Vendors & Products |
Anysphere
Anysphere cursor |
Fri, 07 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cursor
Cursor cursor Microsoft Microsoft windows |
|
| Vendors & Products |
Cursor
Cursor cursor Microsoft Microsoft windows |
Tue, 04 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0. | |
| Title | Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-07T14:26:57.543Z
Reserved: 2025-10-27T15:26:14.127Z
Link: CVE-2025-64107
Updated: 2025-11-05T14:20:25.680Z
Status : Analyzed
Published: 2025-11-04T23:15:44.330
Modified: 2025-11-10T19:54:02.790
Link: CVE-2025-64107
No data.
OpenCVE Enrichment
Updated: 2025-11-05T10:47:05Z