Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute arbitrary system commands through a sophisticated trust bypass mechanism, potentially compromising developer workstations across collaborative coding environments. Check Point Research disclosed the vulnerability, designated CVE-2025-54136 and dubbed “MCPoison,” which exploits Cursor IDE’s Model Context Protocol (MCP) trust system to achieve […]
The post MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Divya
Source: gbHackers
Source Link: https://gbhackers.com/mcpoison-attack-abuses-cursor-ide/