Plattform
vscode
Komponente
cursor
Behoben in
0.45.1
CVE-2025-32018 describes an Arbitrary File Access vulnerability discovered in Cursor, a code editor powered by AI. This regression, present in versions 0.45.0 through 0.48.6, allows the Cursor Agent to potentially write to files outside the intended workspace under specific conditions. While exploitation requires deliberate prompting and is considered highly impractical in real-world scenarios, it poses a risk to sensitive data. The vulnerability is resolved in Cursor version 0.48.7.
The core impact of CVE-2025-32018 lies in the potential for unauthorized file modification. While the vulnerability requires deliberate prompting, a successful attacker could leverage this to alter configuration files, inject malicious code, or compromise sensitive data within the workspace. The blast radius is limited to the files accessible by the Cursor Agent and the user's permissions. Although exploitation is deemed highly impractical due to the need for specific prompting, the potential for data compromise remains a concern, especially in environments where the Cursor Agent has elevated privileges or access to sensitive directories. This vulnerability highlights the importance of carefully reviewing and restricting the permissions granted to AI-powered tools within a development environment.
CVE-2025-32018 is not currently listed on KEV. The EPSS score is likely low due to the impracticality of exploitation, requiring deliberate user prompting. There are no publicly known proof-of-concept exploits available at this time. The vulnerability was disclosed on 2025-04-08.
Developers using Cursor, particularly those working with sensitive code or configuration files, are at risk. Users who rely on the Cursor Agent for automated tasks or code generation are also potentially vulnerable. Shared development environments or workspaces could amplify the impact if one user's account is compromised.
• vscode / supply-chain: Examine Cursor extension settings for unusual file access permissions. Check for suspicious modifications to workspace configuration files. • generic web: Monitor Cursor Agent logs for unexpected file write operations. Review user activity for prompts that might trigger the vulnerability.
Get-Process -Name Cursor | Select-Object -ExpandProperty Pathdisclosure
Exploit-Status
EPSS
0.22% (44% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-32018 is to immediately upgrade to Cursor version 0.48.7 or later. Prior to upgrading, consider backing up your Cursor configuration and workspace to prevent data loss. If upgrading is not immediately feasible, carefully review the Cursor Agent's permissions and restrict its access to only the necessary files and directories. Monitor Cursor's activity logs for any unusual file modification attempts. While no specific WAF or proxy rules are applicable, implementing strict file access controls at the operating system level can further reduce the attack surface. After upgrading, confirm the fix by attempting to trigger the file modification scenario described in the advisory and verifying that the agent is restricted to the intended workspace.
Actualice Cursor a la versión 0.48.7 o superior. Esta versión corrige la vulnerabilidad de escritura arbitraria de archivos. La actualización se puede realizar a través de la interfaz de la aplicación o descargando la última versión desde el sitio web oficial.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-32018 is a HIGH severity vulnerability in Cursor versions 0.45.0 through 0.48.6 that allows unauthorized file modification within the workspace via crafted prompts.
You are affected if you are using Cursor versions 0.45.0 through 0.48.6. Upgrade to version 0.48.7 or later to resolve the issue.
Upgrade to Cursor version 0.48.7 or later. As a temporary workaround, exercise caution when using the Cursor Agent and restrict its access to sensitive files.
Currently, there are no known public exploits or confirmed active exploitation campaigns targeting CVE-2025-32018.
Refer to the official Cursor security advisory for detailed information and updates: [https://cursor.sh/security](https://cursor.sh/security)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.