The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-64106

CVE-2025-64106: Anysphere Cursor Auth Bypass Vulnerability

CVE-2025-64106 is an authentication bypass flaw in Anysphere Cursor that allows attackers to hide malicious commands via crafted deep-links. This post covers the technical details, affected versions, impact, and mitigation.

Published: April 14, 2026

CVE-2025-64106 Overview

CVE-2025-64106 is a command injection vulnerability affecting Cursor, a popular AI-powered code editor developed by Anysphere. The vulnerability exists in Cursor's MCP (Model Context Protocol) server installation component, where an input validation flaw enables specially crafted deep-links to bypass standard security warnings and conceal executed commands from users who choose to accept the server connection.

This vulnerability allows attackers to craft malicious deep-links that, when clicked by a victim, bypass the standard "speedbump" modal warning designed to protect users. If the victim accepts the server connection, commands specified by the attacker's deep-link will be executed without the user's full awareness of what they are authorizing.

Critical Impact

Attackers can leverage social engineering combined with malicious deep-links to execute arbitrary commands on victim systems, potentially leading to complete system compromise, data theft, or malware installation.

Affected Products

  • Anysphere Cursor versions 1.7.28 and below
  • All platforms running vulnerable Cursor versions with MCP server functionality enabled

Discovery Timeline

  • 2025-11-04 - CVE-2025-64106 published to NVD
  • 2025-11-07 - Last updated in NVD database

Technical Details for CVE-2025-64106

Vulnerability Analysis

This vulnerability is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as OS Command Injection. The flaw resides in how Cursor processes and validates deep-link parameters before presenting security prompts to users.

When a user clicks a deep-link designed to install an MCP server, Cursor should display a security warning modal (referred to as a "speedbump") that clearly shows the user what commands will be executed. However, due to improper input validation, an attacker can craft a deep-link that causes the modal to display incorrect or misleading information while the actual command payload remains hidden.

The attack requires user interaction—specifically, the victim must be convinced to click a malicious deep-link and then accept the server connection. However, the social engineering barrier is lowered because the security modal fails to accurately represent the danger.

Root Cause

The root cause of CVE-2025-64106 is insufficient input validation and sanitization in the deep-link URL handler for MCP server installations. The application fails to properly validate and escape special characters or command sequences within the deep-link parameters, allowing attackers to inject hidden commands that bypass the visual security controls presented to users.

Attack Vector

The attack vector is network-based and requires user interaction. An attacker must:

  1. Craft a malicious deep-link containing hidden command injection payloads
  2. Distribute the deep-link via phishing emails, malicious websites, or social engineering
  3. Convince the victim to click the deep-link and accept the MCP server installation
  4. The hidden commands execute on the victim's system with the user's privileges

The vulnerability exploits the trust users place in Cursor's security modal, which is designed to protect them from malicious server connections but fails to accurately display the true nature of the requested action due to the input validation flaw.

Detection Methods for CVE-2025-64106

Indicators of Compromise

  • Unusual Cursor deep-link invocations in browser history or application logs
  • Unexpected MCP server installations or connections in Cursor settings
  • Suspicious child processes spawned by the Cursor application
  • Unusual outbound network connections originating from Cursor processes

Detection Strategies

  • Monitor for deep-link activations containing encoded or obfuscated parameters targeting Cursor
  • Implement endpoint detection rules to identify anomalous process spawning from code editor applications
  • Review system logs for unexpected command executions coinciding with Cursor usage
  • Deploy application whitelisting to control what MCP servers can be installed

Monitoring Recommendations

  • Enable verbose logging in Cursor application settings to capture deep-link processing events
  • Configure EDR solutions to monitor process trees originating from Cursor executables
  • Implement network monitoring for connections to unknown MCP servers
  • Regularly audit installed MCP servers and review their connection history

How to Mitigate CVE-2025-64106

Immediate Actions Required

  • Update Cursor to a version newer than 1.7.28 that addresses this vulnerability
  • Educate users about the risks of clicking deep-links from untrusted sources
  • Review currently installed MCP servers and remove any suspicious or unauthorized connections
  • Consider temporarily disabling deep-link handling for MCP server installations until patched

Patch Information

Anysphere has addressed this vulnerability in versions following 1.7.28. Users should update to the latest available version of Cursor immediately. For detailed information about the fix and affected versions, refer to the GitHub Security Advisory GHSA-4575-fh42-7848.

Workarounds

  • Disable automatic handling of Cursor deep-links at the operating system level
  • Implement strict URL filtering at the network perimeter to block suspicious deep-link patterns
  • Use application control policies to prevent unauthorized MCP server installations
  • Train users to manually verify MCP server details through Cursor's settings interface rather than accepting deep-link initiated installations

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechAnysphere Cursor

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-78
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-26268: Anysphere Cursor Sandbox Escape RCE Flaw

  • CVE-2025-59944: Anysphere Cursor RCE Vulnerability

  • CVE-2025-54132: Cursor Code Editor Disclosure Vulnerability

  • CVE-2025-54133: Anysphere Cursor RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English