Modification of MCP Server Definitions Bypasses Manual Re-approval

Post Reply
Shane1145
Posts: 1624
Joined: Wed Sep 25, 2024 2:31 pm

Modification of MCP Server Definitions Bypasses Manual Re-approval

Post by Shane1145 »

A vulnerability in Cursor AI allows an attacker to achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.exe) without triggering any warning or re-prompt

https://github.com/cursor/cursor/securi ... -g4xr-4395
Post Reply