Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says G

March 18, 2026

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

March 18, 2026

A Guide to Attack Surface Reduction

March 18, 2026
Facebook X (Twitter) Instagram
Wednesday, March 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CursorJack’ Attack Path Exposes Code Execution Risk in AI Development
News

CursorJack’ Attack Path Exposes Code Execution Risk in AI Development

Team-CWDBy Team-CWDMarch 17, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A method that could enable code execution through manipulated installation links in an AI development environment has been identified by security researchers.

The technique, dubbed CursorJack by Proofpoint Threat Research, centres on the abuse of Model Context Protocol (MCP) deeplinks within the Cursor Integrated Development Environment (IDE), potentially allowing attackers to install malicious components or execute arbitrary commands under certain conditions.

The findings, based on controlled testing as of January 19, 2026, show that exploitation is not automatic. Instead, it depends on user interaction and system configuration. A single click on a crafted link, followed by approval of an installation prompt, may be sufficient to trigger the behaviour in some environments.

Manipulating MCP Deeplinks

Cursor uses a custom URL scheme to streamline MCP server installation, embedding configuration data directly into deeplinks that launch the IDE when clicked.

Proofpoint found that this process can be exploited through social engineering as malicious links can be crafted to appear legitimate while containing harmful configurations.

When users click these links and approve the installation prompt, the IDE may execute commands with the same privileges as the user. Because the installation dialogue does not differentiate between trusted and untrusted sources, attackers can disguise their payloads as routine tools. 

This creates a pathway for both local code execution and the installation of remote malicious servers, depending on the configuration.

Security Implications For Developers

The research highlights risks for developers, who often operate with elevated permissions and access sensitive assets such as API keys, credentials and source code. While no zero-click exploitation was observed, the reliance on user approval introduces a human factor that attackers may exploit.

Read more on AI development security risks: ContextCrush Flaw Exposes AI Development Tools to Attacks

The study also noted that modern development workflows, particularly those involving AI tools, may condition users to accept prompts without thorough review. This behaviour increases exposure to deceptive installation requests that appear routine.

Researchers recommend several mitigation strategies:

  • Introduce verification mechanisms for trusted MCP sources

  • Implement stricter permission controls for command execution

  • Improve visibility into installation parameters

  • Treat deeplinks from unknown origins with caution

“The MCP ecosystem requires fundamental security improvements embedded directly into the framework architecture,” Proofpoint wrote, “rather than relying on additional security tools or user vigilance as the primary defense.”

Proofpoint published its own proof-of-concept cod on GitHub. The researchers notified Cursor through its vulnerability‑reporting channel. 

Image credit: bella1105 / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAPT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
Next Article Average Number of Daily API Attacks Up 113% Annually
Team-CWD
  • Website

Related Posts

News

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says G

March 18, 2026
News

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

March 18, 2026
News

A Guide to Attack Surface Reduction

March 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

Chronology of a Skype attack

February 5, 2026

Can password managers get hacked? Here’s what to know

November 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.