CVE-2026-22708
EUVD-2026-267814.01.2026, 17:16
Cursor is a code editor built for programming with AI. Prior to 2.3, hen the Cursor Agent is running in Auto-Run Mode with Allowlist mode enabled, certain shell built-ins can still be executed without appearing in the allowlist and without requiring user approval. This allows an attacker via indirect or direct prompt injection to poison the shell environment by setting, modifying, or removing environment variables that influence trusted commands. This vulnerability is fixed in 2.3.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| anysphere | cursor | 𝑥 < 2.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-15 - External Control of System or Configuration SettingOne or more system settings or configuration elements can be externally controlled by a user.
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.