Description
A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers to execute arbitrary commands on a victim system. When Windsurf processes attacker-controlled HTML content, malicious instructions can cause unauthorized modification of the local MCP configuration and automatic registration of a malicious MCP STDIO server, resulting in execution of arbitrary commands without further user interaction. Successful exploitation may allow attackers to execute commands on behalf of the user, persist malicious MCP configuration changes, and access sensitive information exposed through the application.
Published: 2026-04-15
Score: 8 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A prompt injection vulnerability exists in Windsurf version 1.9544.26. The flaw allows attackers who supply malicious HTML content to inject commands that modify the local MCP configuration. The injected instructions trigger the automatic registration of a rogue MCP STDIO server, allowing the attacker to execute arbitrary system commands on the host machine with the application’s privileges. This can lead to the execution of malicious commands, persistence of unauthorized configuration changes, and disclosure of sensitive data exposed through the application.

Affected Systems

Windsurf 1.9544.26. No other vendor or product versions are listed, and the vulnerability is specific to this version.

Risk and Exploitability

The CVSS score of 8 indicates a high severity remote code execution flaw. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, implying no publicly known exploits yet. The most likely attack vector is remote, with an attacker supplying crafted HTML content that Windsurf will process. Successful exploitation requires the attacker to deliver such content to the application; once processed, the attacker can execute arbitrary system commands, persist configuration changes, and access sensitive information.

Generated by OpenCVE AI on April 16, 2026 at 02:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Windsurf to a patched version once a fix is released by the vendor
  • Implement input validation or sanitization for HTML content processed by Windsurf to prevent injection of malicious commands
  • Disable or restrict automatic registration of MCP STDIO servers to prevent unauthorized server registrations

Generated by OpenCVE AI on April 16, 2026 at 02:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Title Prompt Injection in Windsurf Enables Remote Command Execution

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Windsurf
Windsurf windsurf
Vendors & Products Windsurf
Windsurf windsurf

Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers to execute arbitrary commands on a victim system. When Windsurf processes attacker-controlled HTML content, malicious instructions can cause unauthorized modification of the local MCP configuration and automatic registration of a malicious MCP STDIO server, resulting in execution of arbitrary commands without further user interaction. Successful exploitation may allow attackers to execute commands on behalf of the user, persist malicious MCP configuration changes, and access sensitive information exposed through the application.
References

Subscriptions

Windsurf Windsurf
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-15T17:54:48.560Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30615

cve-icon Vulnrichment

Updated: 2026-04-15T17:54:41.755Z

cve-icon NVD

Status : Received

Published: 2026-04-15T16:16:36.177

Modified: 2026-04-15T18:16:59.583

Link: CVE-2026-30615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:45:06Z

Weaknesses