Cyber Posture

CVE-2025-61591

High

Published: 03 October 2025

Published
03 October 2025
Modified
17 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.

Security Summary

CVE-2025-61591 is a command injection vulnerability (CWE-78) affecting Cursor, an AI-powered code editor for programming, in versions 1.7 and below. The flaw occurs when the MCP component uses OAuth authentication with an untrusted MCP server, allowing an attacker to impersonate a malicious server and inject crafted commands during the authentication interaction process. This leads to potential remote code execution on the affected host.

An attacker with network access can exploit this vulnerability without prior privileges by tricking a user into authenticating via OAuth to a malicious MCP server (user interaction required, per CVSS UI:R). Successful exploitation enables arbitrary command injection by the agent, resulting in remote code execution with full user privileges on the host system, compromising confidentiality, integrity, and availability (CVSS 8.8: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

The GitHub security advisory at https://github.com/cursor/cursor/security/advisories/GHSA-wj33-264c-j9cq notes no fixed release version is available yet, but a patch (2025.09.17-25b418f) has been issued for remediation. Security practitioners should apply this patch promptly and avoid using untrusted MCP servers with OAuth in Cursor installations.

Cursor's integration of AI for programming introduces relevance to AI/ML workflows, as exploitation could target developer environments handling AI model code or data. No public reports of real-world exploitation are available as of the CVE publication on 2025-10-03.

Details

CWE(s)
CWE-78

Affected Products

anysphere
cursor
≤ 1.7

AI Security Analysis

AI Category
Other Platforms
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Cursor is an AI-powered code editor designed for programming with AI, functioning as an enterprise-level AI assistant for developers, with the vulnerability occurring in its integration with AI services via MCP OAuth authentication.

MITRE ATT&CK Enterprise Techniques

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Vulnerability enables server impersonation (T1557) during OAuth to inject commands (T1059) for remote code execution via client application exploitation (T1203).

References