PulseAugur
LIVE 08:27:19
tool · [1 source] ·
0
tool

Cursor AI IDE vulnerable to arbitrary code execution via Git hooks

A critical vulnerability, CVE-2026-26268, has been identified in versions of the Cursor AI IDE prior to 2.5. This flaw allows malicious repositories to execute arbitrary code on a developer's machine through Git hooks when the Cursor agent performs routine Git operations. The vulnerability requires no user interaction and bypasses standard security prompts. Armor1's Client Catalog has flagged this issue, highlighting risks associated with AI coding clients that run workspace-controlled scripts without explicit user confirmation. AI

Summary written by gemini-2.5-flash-lite from 1 source. How we write summaries →

IMPACT Developers using older versions of the Cursor AI IDE are at risk of code execution if they open malicious repositories, necessitating immediate updates and credential audits.

RANK_REASON The article details a specific vulnerability in a software product and how to detect and fix it, along with how a third-party tool identifies such risks.

Read on dev.to — MCP tag →

COVERAGE [1]

  1. dev.to — MCP tag TIER_1 · Armor1 ·

    How to Check if You're Affected by CVE-2026-26268 in Cursor (and What to Do)

    <p>CVE-2026-26268 is a CVSS 8.1 high-severity vulnerability in the Cursor AI IDE that lets a malicious repository execute arbitrary code on a developer's machine the moment Cursor's agent performs a Git operation against it. There is no prompt injection, no user click, and no war…