Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cursor AI code editor fixed the flaw that allows attackers to execute commands via SlackMCP
Identity

Cursor AI code editor fixed the flaw that allows attackers to execute commands via SlackMCP

userBy userAugust 1, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have revealed the current high-patch, high-level security flaws of Cursor, a popular artificial intelligence (AI) code editor, which could lead to remote code execution.

The vulnerability tracked as CVE-2025-54135 (CVSS score: 8.6) is addressed in version 1.3, released on July 29, 2025. It is called Curxecute by AIM Labs, which previously disclosed echo leaks.

“When a cursor runs with developer-level privileges and pairs with an MCP server that retrieves untrusted external data, that data can redirect the agent’s control flow and take advantage of those privileges.”

“By supplying addiction data to agents via MCP, attackers can obtain full remote code interpretation under the user’s privileges, achieving everything, including ransomware, data theft, AI manipulation, hallucination and more.”

The vulnerability is similar to echo leaks in that tools exposed by Model Control Protocol (MCP) servers used by AI models and exposed by Model Control Protocol (MCP) servers can retrieve untrusted data that could poison the agent’s expected behavior to be poisoned to the agent’s expected behavior.

Specifically, AIM Security has discovered that the MCP.JSON file used to configure custom MCP servers in Cursor can trigger the execution of new entries (e.g., adding Slack MCP servers) without requiring verification.

Cybersecurity

This autorun mode is particularly dangerous as it can lead to autorun of malicious payloads injected by attackers via slack messages. The attack sequence proceeds as follows:

The user adds the Slack MCP Server via the CURSOR UI Attacker Posts message. Use the victim of the command injection payload to post a message to the public rack channel.

“The central cause of the defect is that new entries in the global MCP JSON file are automatically started,” AIM Security said. “Even if the edit was rejected, the code execution had already happened.”

The entire attack is notable for its simplicity. However, it emphasizes how AI assist tools can open up new attack surfaces when dealing with external content, in this case third-party MCP servers.

“AI agents continue to bridge the external, internal and interactive worlds, so the security model must assume that external contexts can affect the agent runtime.

Version 1.3 of the cursor also addresses another issue with autorun mode that allows you to easily avoid denilist-based protection of the platform using methods of enclosing shell commands in Base64-Encoding, Shell Scripts, and cotes (such as “e” cho bypass).

Following responsible disclosure by the Backslash Research team, Cursor took the step to completely condemn Auto-Run’s denigrilla functionality.

“Don’t expect the built-in security solutions offered by the Vibe Coding platform to be comprehensive or indefinite,” said researchers Mustafa Naamne and Mika Gold. “The end-user organization is responsible for ensuring that the agent system is equipped with the appropriate guardrails.”

Disclosure arises as HiddenLayer has discovered that Cursor’s inefficient Dennilist approach can be weaponized by embedding malicious instructions hidden in the GitHub ReadMe.md file, allowing attackers to run API keys, SSH credentials, and even blocked system commands.

“When the victim saw the project on Github, no rapid injections were visible, and they asked Cursor to clone the project and help Cursor with the general occurrence of IDE-based agent systems,” noted researchers Kasimir Schulz, Kenneth Yeung, and Tom Bonner.

Identity Security Risk Assessment

“However, after cloning the project and reviewing README to see the steps to set up the project, the rapid injection took over the AI model and forced the user to find the key in the user’s workspace before removing the key with curls using the GREP tool.”

HiddenLayer also discovered an additional weakness that allows you to leak system prompts for your cursor by overriding OpenAI API requests to the proxy model, and discovered what is called a tool combination attack by removing the user’s private SSH key by leveraging two benign tools, Read_File and Create_Diagram.

This essentially involves inserting a quick injection command into the github readme.md file that is parsed by the cursor when the victim user asks the code editor to summarize the file, and then executing the command.

The hidden instruction, in that part, reads the private SSH key belonging to the user using the read_file tool and excludes the key in the attacker-controlled webhook.site url using the create_diagram tool. All defects identified were fixed by cursors in version 1.3.

News of various vulnerabilities in cursors arises as Tracebit devised an attack targeting Google’s Gemini CLI, an open source command line tool that has been tweaked to code tasks.

As observed in the case of cursors, the attack requires the victim to (1) tell the Gemini CLI to interact with the Github codebase created by the attacker that contains indirect rapid injection that is distrustful in the Gemini.md context file, and (2) to instruct the Gemini CLI to add benign commands to Alloalist (EG, Grep).

“The rapid injection targeting these elements and critical validation and display issues within the Gemini CLI can lead to undetectable arbitrary code execution,” said Sam Cox, founder and CTO of Tracebit.

To mitigate the risk posed by attacks, Gemini CLI users are advised to upgrade their installation to version 0.1.14, which was shipped on July 25, 2025.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBasic Research Lab nabs over $30 million to build AI agents vertically
Next Article Details will be revealed about how Windsurf’s VCS and Founders were paid from Google transactions
user
  • Website

Related Posts

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

August 1, 2025

Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit

August 1, 2025

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

August 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Tesla is partially liable in Florida’s Autopilot Trial, with ju apprentices awarding $200 million in damages

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.