FKIE_CVE-2025-32018

Vulnerability from fkie_nvd - Published: 2025-04-08 16:15 - Updated: 2025-04-08 18:13
Summary
Cursor is a code editor built for programming with AI. In versions 0.45.0 through 0.48.6, the Cursor app introduced a regression affecting the set of file paths the Cursor Agent is permitted to modify automatically. Under specific conditions, the agent could be prompted, either directly by the user or via maliciously crafted context, to automatically write to files outside of the opened workspace. This behavior required deliberate prompting, making successful exploitation highly impractical in real-world scenarios. Furthermore, the edited file was still displayed in the UI as usual for user review, making it unlikely for the edit to go unnoticed by the user. This vulnerability is fixed in 0.48.7.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cursor is a code editor built for programming with AI. In versions 0.45.0 through 0.48.6, the Cursor app introduced a regression affecting the set of file paths the Cursor Agent is permitted to modify automatically. Under specific conditions, the agent could be prompted, either directly by the user or via maliciously crafted context, to automatically write to files outside of the opened workspace. This behavior required deliberate prompting, making successful exploitation highly impractical in real-world scenarios. Furthermore, the edited file was still displayed in the UI as usual for user review, making it unlikely for the edit to go unnoticed by the user. This vulnerability is fixed in 0.48.7."
    },
    {
      "lang": "es",
      "value": "Cursor es un editor de c\u00f3digo dise\u00f1ado para programar con IA. En las versiones 0.45.0 a 0.48.6, la aplicaci\u00f3n Cursor introdujo una regresi\u00f3n que afectaba al conjunto de rutas de archivo que el Agente Cursor pod\u00eda modificar autom\u00e1ticamente. En determinadas circunstancias, el agente pod\u00eda ser inducido, ya sea directamente por el usuario o mediante un contexto malicioso, a escribir autom\u00e1ticamente en archivos fuera del espacio de trabajo abierto. Este comportamiento requer\u00eda una incitaci\u00f3n deliberada, lo que hac\u00eda muy impracticable su explotaci\u00f3n en situaciones reales. Adem\u00e1s, el archivo editado segu\u00eda mostr\u00e1ndose en la interfaz de usuario como de costumbre para su revisi\u00f3n por parte del usuario, lo que imped\u00eda que la edici\u00f3n pasara desapercibida. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.48.7."
    }
  ],
  "id": "CVE-2025-32018",
  "lastModified": "2025-04-08T18:13:53.347",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 6.0,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-08T16:15:27.487",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/getcursor/cursor/security/advisories/GHSA-qjh8-mh96-fc86"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…