In a startling revelation, the popular AI-powered coding assistant Cursor was found vulnerable to a flaw that could’ve let attackers silently run commands on developers’ machines—all without a single warning prompt.
This incident is more than just a technical slip—it’s a cautionary tale about the hidden dangers of AI-integrated development tools.

🔍 What Really Happened?
A critical vulnerability, now tracked as CVE‑2025‑54135 (aka “CurXecute”), was uncovered in Cursor’s Model Control Protocol (MCP). This AI assistant, built directly into the developer’s IDE, was unintentionally exposing a backdoor through its mcp.json configuration file.
All it took was a malicious MCP server reference—hidden in a chat, commit, or Slack message—for Cursor’s agent to execute attacker-supplied code locally. No user confirmation. No warning. Just… execute.
🚨 What Could Attackers Do?
- Run terminal commands silently on your machine
- Steal files, inject malware, or alter your codebase
- Exploit developer-level permissions to escalate attacks
The risk was amplified because Cursor, like many dev tools, operates with elevated privileges and direct access to project directories.
🛠️ How Cursor Responded
On July 29, 2025, Cursor released version 1.3, which introduces:
- Mandatory confirmation before executing or editing files via external agents
- Enhanced sandboxing for agents pulling from untrusted sources
- Updated best-practice documentation for safe usage
If you haven’t updated yet—do it now.
🤖 Why Prompt Injection Is the Silent Killer of AI Dev Tools
Prompt injection is the new buffer overflow. It tricks an AI into executing unintended behaviors, and in this case, it was potentially catastrophic.
While the vulnerability exploited configuration rather than model logic, the entry point was still the AI agent—which acted on input without verifying source integrity. This is part of a growing trend in AI-powered dev tools: smarter, faster… but also more fragile.
🧱 Staying Safe: Dev Checklist
- ✅ Upgrade to Cursor v1.3 or later immediately
- ✅ Manually audit your
~/.cursor/mcp.jsonfile - ✅ Avoid opening MCP references from unknown Slack/Discord/GitHub messages
- ✅ Stick to official Cursor packages—some third-party npm clones have included malware
- ✅ Keep auto-update enabled and turn on terminal output previews
🧠 FAQ: What Developers Need to Know
Q: Is Cursor still safe to use?
Yes—if you’re on the latest version and avoid unknown sources. The flaw is patched and now requires user confirmation for risky actions.
Q: How was this discovered?
Ethical hackers at Aim Labs found the issue and reported it through responsible disclosure channels.
Q: Could this have been exploited in the wild?
There’s no public evidence of active exploitation, but the simplicity of the vector means it’s possible.
Q: Is this a Cursor-only problem?
No. Prompt injection and configuration-based attacks are emerging risks across all AI-assisted dev tools, including GitHub Copilot, Cody, and others.
Q: What’s next?
Expect AI tooling platforms to move toward more restrictive sandboxing, structured prompt formats, and advanced validation layers.
💡 Final Thought
AI-powered dev tools like Cursor promise incredible productivity—but also invite entirely new categories of risk. The “CurXecute” flaw is a wake-up call that smart tools need smarter security.
Let this be a reminder: If the AI can code for you, it can also be tricked into coding against you. Stay updated, stay vigilant, and never trust a prompt blindly.

Sources The Hacker News

