Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Cursor
Cursor cursor
Vendors & Products Cursor
Cursor cursor

Tue, 04 Nov 2025 23:15:00 +0000

Type Values Removed Values Added
Description Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
Title Cursor's Sensitive File Modification can Lead to NTFS Path Quirks
Weaknesses CWE-22
CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-04T22:58:53.745Z

Reserved: 2025-10-27T15:26:14.127Z

Link: CVE-2025-64108

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-04T23:15:44.470

Modified: 2025-11-04T23:15:44.470

Link: CVE-2025-64108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-05T10:47:14Z