CursorJack Exploits Cursor IDE Deeplinks for Remote Code Execution
What Happened — Researchers discovered a technique, dubbed CursorJack, that abuses the cursor:// protocol handler in Cursor IDE to trigger arbitrary command execution or install a malicious remote MCP server after a single user click and acceptance of an install prompt. The attack leverages maliciously‑crafted deeplinks and social‑engineering to drive execution.
Why It Matters for TPRM —
- Developer‑focused SaaS tools can become a conduit for supply‑chain compromise of code repositories and API keys.
- Successful exploitation grants attackers footholds on privileged workstations, expanding lateral movement risk across partner networks.
- The lack of visual distinction between benign and malicious deeplinks increases phishing success rates in enterprise environments.
Who Is Affected — Technology / SaaS vendors providing development environments, MSPs managing developer workstations, and any organization that integrates Cursor IDE into its software‑development lifecycle.
Recommended Actions —
- Review contracts and security questionnaires for Cursor IDE usage; verify that the vendor enforces strict protocol‑handler controls.
- Deploy endpoint protection that blocks unknown custom URL schemes or requires admin approval for
cursor://links. - Conduct user‑awareness training focused on malicious deeplink phishing.
- Monitor for anomalous MCP server registrations and enforce network segmentation for development assets.
Technical Notes — The cursor://anysphere.cursor-deeplink/mcp/install?name=<name>&config=<base64> scheme registers with the OS; when invoked, Cursor parses the base64‑encoded configuration and may execute the command parameter or connect to a remote MCP server defined by the url parameter. No CVE has been assigned; the vendor classified the report as out‑of‑scope. The exploit requires a user click and explicit acceptance of the install dialog, making it a high‑impact, low‑complexity phishing vector. Source: https://www.proofpoint.com/us/blog/threat-insight/cursorjack-weaponizing-deeplinks-exploit-cursor-ide