Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Cursor Autorun Flaw Lets Repositories Execute Code Without Consent
Cyber Security

Cursor Autorun Flaw Lets Repositories Execute Code Without Consent

Team-CWDBy Team-CWDSeptember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly disclosed flaw in the Cursor extension allows repositories to automatically execute code when a folder is opened, even without a developer’s consent.

The issue stems from the extension’s “autorun” feature, which launches commands tied to workspace events, such as opening a project.

Researchers at Oasis Security found that malicious actors could craft repositories that exploit this functionality. By embedding hidden instructions, attackers can trigger unauthorized code execution the moment a user opens the repository in Visual Studio Code with Cursor installed.

Supply Chain Risks Exposed

The discovery highlights how supply chain threats are evolving beyond dependency hijacking. Instead of waiting for a developer to run scripts or install packages, adversaries can now weaponize something as routine as opening a folder.

“The Oasis Security team’s findings highlight a serious but often overlooked risk: the silent execution of malicious code through development environments,” said Heath Renfrow, CISO at Fenix24.

Randolph Barr, CISO at Cequence Security, added: “I think this highlights a theme we’ve seen many times before – when products hit hypergrowth adoption (especially during COVID), ‘secure by default’ often gets sacrificed for speed. Cursor is going through the same rapid iteration cycles we saw with other tools back then, and unfortunately, it means repeating mistakes that more mature companies have already learned from.”

Read more on software supply chain security: GhostAction Supply Chain Attack Compromises 3000+ Secrets

The potential consequences are significant. Malicious repositories could be used to:

  • Steal authentication tokens or API keys

  • Alter local project files

  • Plant persistent malware within the development environment

Renfrow noted that with Workspace Trust disabled by default in Cursor, “this vulnerability effectively turns a simple ‘open folder’ action into a potential full compromise of a developer’s machine.” 

He warned that developer laptops often contain cloud API keys, SaaS sessions and CI/CD credentials that attackers can exploit.

Barr also emphasized the growing focus on Cursor.

“What stands out here is that Cursor has already been a target – CurXecute and MCPoison were both identified this year (2025), along with at least two other Cursor-related vulnerabilities in the same timeframe,” he said.

“Add in malicious npm packages that specifically targeted Cursor’s macOS users, and it’s clear this editor is firmly in the sights of bad actors.”

Industry Experts Weigh In

Trey Ford, chief strategy and trust officer at Bugcrowd, called the flaw “an old-world vulnerability pattern that reminds me of the autorun.inf needing to be blocked when inserting a CD-ROM, DVD or removable drive from twenty-plus years ago.”

He added that Cursor is now being compared to Microsoft’s Visual Studio.

“This is a cause for a high-five and a reckoning to further harden and expand enterprise security capabilities,” Ford added.

The report underscores a broader problem: developer tools are now part of the attack surface.

“This finding is a reminder that development tools are part of the attack surface and require the same level of hardening as production infrastructure,” Renfrow concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleA Critical Part of Enterprise AI Governance
Next Article Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.