Cyber Posture

CVE-2025-62353

Critical

Published: 17 October 2025

Published
17 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 28.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.

Security Summary

CVE-2025-62353 is a path traversal vulnerability (CWE-22) affecting all versions of the Windsurf IDE. It enables a threat actor to read and write arbitrary local files on an end user's system, both within and outside of current projects. The flaw is reachable directly or through indirect prompt injection, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high-impact access to read sensitive files or overwrite critical system files, potentially leading to full system compromise, data theft, or persistent malware deployment on the victim's machine.

The primary advisory from HiddenLayer provides further details on mitigation strategies at https://hiddenlayer.com/sai_security_advisor/2025-10-windsurf/. Security practitioners should consult this reference for patch availability, workarounds, or configuration guidance specific to Windsurf IDE deployments.

Details

CWE(s)
CWE-22

AI Security Analysis

AI Category
Enterprise AI Assistants
Risk Domain
LLM/Generative AI Risks
OWASP Top 10 for LLMs 2025
LLM01:2025 Prompt Injection
MITRE ATLAS Techniques
AML.T0051.001: Indirect
Classification Reason
Windsurf IDE is an AI-powered development environment vulnerable to prompt injection, aligning with enterprise AI assistants that integrate LLMs for coding assistance.

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

The path traversal vulnerability enables arbitrary read access to local files outside project directories, facilitating data collection from the local system (T1005), file and directory discovery (T1083), and accessing unsecured credentials in files (T1081). Write access further supports related persistence and modification techniques.

References