CVE-2025-64107

Source
https://cve.org/CVERecord?id=CVE-2025-64107
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64107.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64107
Aliases
  • GHSA-2jr2-8wf5-v6pf
Published
2025-11-04T22:51:42.609Z
Modified
2026-03-13T03:40:57.091466Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows
Details

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64107.json"
}
References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "2.0"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64107.json"