Browse all 22 CVE security advisories affecting cursor. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cursor is an AI-native code editor designed to accelerate software development through integrated machine learning capabilities. Its architecture, which relies heavily on cloud-based processing and external API integrations, introduces a distinct attack surface compared to traditional standalone IDEs. Historical vulnerability assessments reveal a pattern of critical flaws, including Remote Code Execution (RCE) and Cross-Site Scripting (XSS), often stemming from insufficient input validation in its web-based interfaces and extension systems. Additionally, privilege escalation risks have been documented, particularly where local file permissions interact poorly with elevated AI agent permissions. While no massive data breaches have been publicly confirmed, the high volume of recorded CVEs indicates systemic weaknesses in its security model. These issues highlight the inherent risks of embedding complex, third-party AI services directly into development tools, necessitating rigorous sandboxing and continuous security auditing to mitigate potential exploitation vectors.
This page lists every published CVE security advisory associated with cursor. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.