← Zuruck zu CVEs
CVE-2026-31854
HIGH8.8
Beschreibung
Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visited website contains maliciously crafted instructions, the model may attempt to follow them in order to “assist” the user. When combined with a bypass of the command whitelist mechanism, such indirect prompt injections could result in commands being executed automatically, without the user’s explicit intent, thereby posing a significant security risk. This vulnerability is fixed in 2.0.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht3/11/2026
Zuletzt geandert3/20/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
anysphere:cursor
Schwachen (CWE)
CWE-78
Referenzen
https://github.com/cursor/cursor/security/advisories/GHSA-hf2x-r83r-qw5q(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.