@beyondmachines1@infosec.exchange
Cursor IDE vulnerability enables persistent code execution through AI plugin trust bypass
Cursor AI code editor patched a vulnerability (CVE-2025-54136) that allowed attackers to achieve persistent remote code execution through the "MCPoison" attack, where malicious modifications to previously approved Model Context Protocol configurations execute automatically without additional security prompts.
If you're using Cursor AI code editor, upgrade to version 1.3 or later to avoid the MCPoison vulnerability that can be abused by attackers to send code execution through poisoned MCP configurations. If you can't upgrade right away, restrict who can modify .cursor/rules/mcp.json files in your repositories and treat these MCP configurations like critical code that requires thorough review before approval.
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cursor-ide-vulnerability-enables-persistent-code-execution-through-ai-plugin-trust-bypass-6-i-3-u-r/gD2P6Ple2L