Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser

Security researchers have uncovered a critical vulnerability in Cursor, the AI-powered code editor, that allows attackers to inject malicious code through rogue Model Context Protocol (MCP) servers. Unlike VS Code, Cursor lacks integrity checks on its runtime components, making it vulnerable to tampering through MCP server registration. The attack works by registering a local MCP […]

The post Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Read the original article: