CVE-2025-64108

Source
https://cve.org/CVERecord?id=CVE-2025-64108
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64108.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64108
Aliases
  • GHSA-6r98-6qcw-rxrw
Published
2025-11-04T22:58:53.745Z
Modified
2026-03-13T03:38:20.442607Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Cursor's Sensitive File Modification can Lead to NTFS Path Quirks
Details

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64108.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22",
        "CWE-94"
    ]
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64108.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "2.0"
            }
        ]
    }
]