URL has been copied successfully!
MCP Protocol Bug Let Attackers Execute Code in Cursor
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

MCP Protocol Bug Let Attackers Execute Code in Cursor

Cursor Patched Flaw Days After Disclosure, Says Check Point. Check Point researchers found a RCE flaw in Cursor, an AI-powered code editor, by manipulating a previously approved model context protocol configuration. Once a developer approved a configuration file for an MCP server, any future changes to that file could be executed without further prompts.

First seen on govinfosecurity.com

Jump to article: www.govinfosecurity.com/mcp-protocol-bug-let-attackers-execute-code-in-cursor-a-29140

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link