Cursor Vulnerability Exposes Developer API Tokens
Security researchers at LayerX disclosed a high-severity vulnerability called "CursorJacking" in the Cursor AI-powered development environment, according to reporting indexed by GBHackers Security via itsecuritynews.info. The flaw has been assigned a CVSS 8.2 severity and, per the report, allows any installed extension to silently access developers' API keys and session tokens without requiring special permissions or user interaction. The report frames the issue as immediate credential-theft risk for developers who run third-party extensions in Cursor. The article does not include a direct quote from Cursor developers in the scraped report.
What happened
Security researchers at LayerX disclosed a vulnerability named CursorJacking, which the published report assigns a CVSS 8.2 severity, according to reporting indexed by GBHackers Security on itsecuritynews.info. The report states that the flaw lets any installed extension in the Cursor development environment silently access a user's API keys and session tokens without requiring special permissions or explicit user interaction.
Technical details (Editorial analysis - technical context)
Editorial analysis - technical context: The report describes a permissions and isolation failure between the IDE host and extensions. Comparable extension ecosystems historically allow extensions broad runtime access unless the platform enforces strict capability scoping or sandboxing. Attack vectors that exploit extension privileges often exfiltrate secrets stored in memory, configuration files, or connected services.
Context and significance (Industry context)
Industry context
For developers using AI-assisted IDEs, credential theft in an editor plug-in model increases the attack surface because extensions routinely request access to environment state, language servers, and networked APIs. Past high-severity extension vulnerabilities in other ecosystems have led to token leakage and supply-chain incidents that required rapid remediation and tightened permission models.
What to watch
For practitioners: observers should watch for an official security advisory from Cursor or its maintainers, published mitigations or updates to extension permission controls, and indicators of compromise in developer environments. Security teams should audit installed extensions and their privileges following the disclosure.
Scoring Rationale
A high-severity vulnerability that reportedly exposes developer API keys in a popular AI-enabled IDE is directly relevant to practitioners who build and secure development workflows. The story is notable but not yet confirmed across multiple independent sources, so its impact is substantial but not industry-shaking.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems


