{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T16:50:53.609","vulnerabilities":[{"cve":{"id":"CVE-2025-54130","sourceIdentifier":"security-advisories@github.com","published":"2025-08-05T01:15:41.247","lastModified":"2025-08-25T01:38:42.840","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive editor files, such as the .vscode/settings.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9."},{"lang":"es","value":"Cursor es un editor de código diseñado para programar con IA. Permite escribir archivos en el espacio de trabajo sin la aprobación del usuario en versiones anteriores a la 1.3.9. Si el archivo es un archivo de puntos, editarlo requiere aprobación, pero crear uno nuevo no. Por lo tanto, si no existen archivos sensibles del editor, como el archivo .vscode/settings.json, en el espacio de trabajo, un atacante puede encadenar una vulnerabilidad de inyección indirecta de mensajes para secuestrar el contexto y escribir en el archivo de configuración, lo que activa una RCE en la víctima sin la aprobación del usuario. Esto se corrigió en la versión 1.3.9."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:anysphere:cursor:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.9","matchCriteriaId":"17297CB2-0B98-497A-8796-F7F09E9B9876"}]}]}],"references":[{"url":"https://github.com/cursor/cursor/security/advisories/GHSA-vqv7-vq92-x87f","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}