AI-powered Cursor IDE vulnerable to prompt-injection attacks
![]()
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges.
The secur …
Read more
Published Date:
Aug 01, 2025 (2 hours, 41 minutes ago)
Vulnerabilities has been mentioned in this article.