{"id":"CVE-2025-64106","summary":"Cursor: Speedbump Modal Bypass in MCP Server Deep-Link","details":"Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.","aliases":["GHSA-4575-fh42-7848"],"modified":"2026-04-10T05:33:41.356663Z","published":"2025-11-04T22:48:14.832Z","database_specific":{"cwe_ids":["CWE-78"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64106.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64106.json"},{"type":"ADVISORY","url":"https://github.com/cursor/cursor/security/advisories/GHSA-4575-fh42-7848"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64106"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64106.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}