Information security
fromSecurityWeek
6 hours agoCursor AI Vulnerability Exposed Developer Devices
A vulnerability in Cursor AI allows attackers to hijack developer machines via malicious repositories without user interaction.
"Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals," Percoco stated.
[In] ShowDoc version before 2.8.7, an unrestricted and unauthenticated file upload issue is found and [an] attacker is able to upload a web shell and execute arbitrary code on server.