Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cursor AI Editor's Autorun Feature Exposed: A New Frontier in Supply Chain Attacks


A critical vulnerability has been discovered in the Cursor AI editor, allowing malicious actors to execute arbitrary code on devices. This exposes a new frontier in supply chain attacks, highlighting the potential for devastating consequences for global cybersecurity.

  • The Cursor AI editor contains a critical vulnerability that can enable malicious actors to execute arbitrary code on devices.
  • A threat actor could exploit this weakness by adding a malicious .vscode/tasks.json file in a publicly shared repository, which would execute arbitrary code in the user's environment as soon as they opened the project folder from Cursor.
  • The vulnerability has the potential to leak sensitive credentials, modify files, or serve as a vector for broader system compromise.
  • Mitigation steps include using a different editor, verifying repositories before opening them, and avoiding exporting sensitive credentials globally in shell profiles.
  • Microsoft is monitoring the situation closely and will take steps to address any potential risks associated with the Cursor editor, but no fix is currently available.



  • In a shocking revelation, researchers at Oasis Security have discovered that the Cursor AI editor, an increasingly popular Integrated Development Environment (IDE) used by over a million developers to generate billions of lines of code every day, contains a critical vulnerability that can enable malicious actors to execute arbitrary code on devices. The flaw lies in the Cursor editor's autorun feature, which allows users to automate tasks without explicit consent.

    This discovery has sent shockwaves through the cybersecurity community, highlighting the potential for supply chain attacks to compromise even seemingly secure coding tools. According to Oasis Security, a threat actor could exploit this weakness by adding a malicious .vscode/tasks.json file in a publicly shared repository, which would execute arbitrary code in the user's environment as soon as they opened the project folder from Cursor.

    The researchers found that when a user opens such a repository from Cursor, even for simple browsing, arbitrary code can be run in their environment. This has the potential to leak sensitive credentials, modify files, or serve as a vector for broader system compromise. To illustrate this vulnerability, Oasis Security published a proof-of-concept for a tasks.json file that executes a shell command to send the name of the current user when opening the project folder in Cursor.

    The implications of this discovery are far-reaching and alarming. With over a billion lines of code generated every day through the Cursor editor, the potential impact on global cybersecurity is significant. Threat actors could potentially use this vulnerability to steal sensitive data, establish connections to command-and-control (C2) infrastructure, or create an infection vector for supply-chain attacks.

    TheCursor team has acknowledged the risk and stated that they intended to keep the autorun behavior in the code editor, citing the need to disable Workspace Trust, which disables AI and other features users want to use within the product. However, this stance has raised concerns among cybersecurity experts, who have warned users of the potential risks associated with the Cursor editor's autorun feature.

    To mitigate this vulnerability, Oasis Security recommends that users take several precautions. Firstly, they advise using a different editor for opening unknown projects. Secondly, users should verify the repositories before opening them to avoid executing malicious code. Finally, they suggest avoiding exporting sensitive credentials globally in shell profiles and instead opting for environment-specific settings.

    In response to this vulnerability, Microsoft has issued a statement assuring users that it would be monitoring the situation closely and taking steps to address any potential risks associated with the Cursor editor. However, as of now, there is no fix available, and users are left vulnerable to exploitation by malicious actors.

    The discovery of this vulnerability highlights the importance of security in coding tools and emphasizes the need for developers to prioritize security when creating or using software development environments. As the world becomes increasingly dependent on technology, cybersecurity threats like this one underscore the need for vigilance and proactive measures to protect users' sensitive data and systems from exploitation.

    The recent revelations surrounding the Cursor editor's autorun feature serve as a stark reminder of the evolving nature of supply chain attacks and their potential impact on global security. As new vulnerabilities are discovered, it is essential that developers, users, and cybersecurity professionals work together to address these issues proactively, ensuring that coding tools remain secure and trustworthy.

    The discovery also raises questions about the responsibility of tech companies to prioritize user safety in their products. Will Cursor be able to rectify this vulnerability, or will other coding tools follow suit? Only time will tell, but one thing is clear: the world needs to stay vigilant and proactive when it comes to cybersecurity threats like this one.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Cursor-AI-Editors-Autorun-Feature-Exposed-A-New-Frontier-in-Supply-Chain-Attacks-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/cursor-ai-editor-lets-repos-autorun-malicious-code-on-devices/


  • Published: Wed Sep 10 15:35:23 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us