CVE-2026-26268
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in the Cursor code editor to gain control of the system by manipulating Git settings, allowing them to run harmful commands without any user interaction. This vulnerability affects versions prior to 2.5 and can lead to remote code execution when certain Git hooks are triggered.
Technical Description
Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuration was possible in versions prior to 2.5. A malicious agent (ie prompt injection) could write to improperly protected .git settings, including git hooks, which may cause out-of-sandbox RCE next time they are triggered. No user interaction was required as Git executes these commands automatically. Fixed in version 2.5.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 13, 2026
7 days ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
anysphere
Product
cursor