CVE-2025-62353
Published: 17 October 2025
Description
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Security Summary
CVE-2025-62353 is a path traversal vulnerability (CWE-22) affecting all versions of the Windsurf IDE. It enables a threat actor to read and write arbitrary local files on an end user's system, both within and outside of current projects. The flaw is reachable directly or through indirect prompt injection, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high-impact access to read sensitive files or overwrite critical system files, potentially leading to full system compromise, data theft, or persistent malware deployment on the victim's machine.
The primary advisory from HiddenLayer provides further details on mitigation strategies at https://hiddenlayer.com/sai_security_advisor/2025-10-windsurf/. Security practitioners should consult this reference for patch availability, workarounds, or configuration guidance specific to Windsurf IDE deployments.
Details
- CWE(s)
AI Security Analysis
- AI Category
- Enterprise AI Assistants
- Risk Domain
- LLM/Generative AI Risks
- OWASP Top 10 for LLMs 2025
- MITRE ATLAS Techniques
- Classification Reason
- Windsurf IDE is an AI-powered development environment vulnerable to prompt injection, aligning with enterprise AI assistants that integrate LLMs for coding assistance.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The path traversal vulnerability enables arbitrary read access to local files outside project directories, facilitating data collection from the local system (T1005), file and directory discovery (T1083), and accessing unsecured credentials in files (T1081). Write access further supports related persistence and modification techniques.