Tracked informally as “CursorJacking,” the flaw carries a CVSS score of 8.2 and allows any installed extension to silently extract API keys and session tokens without user interaction or elevated permissions.
The issue stems from insecure credential storage and a lack of isolation between extensions and sensitive application data, placing developers and their associated services at significant risk.
Cursor diverges from standard security practices by storing authentication secrets in a local, unencrypted SQLite database rather than leveraging secure storage mechanisms such as macOS Keychain or Windows Credential Manager.
This database resides at a predictable file path on the host system, making it easily accessible.
More critically, Cursor fails to enforce access control boundaries between its extension ecosystem and local storage.
As a result, any extension, regardless of its declared permissions, can directly query the database and retrieve plaintext credentials.
This architectural oversight effectively nullifies the concept of permission-based security within the extension model.
The exploitation process is straightforward and requires minimal attacker effort, making it highly scalable and dangerous in real-world scenarios.
Because the attack operates silently and leverages legitimate extension functionality, detection is extremely difficult for end users.
The implications of CursorJacking extend far beyond local credential exposure. Given the high-privilege nature of developer API keys, attackers can rapidly escalate access and cause widespread damage.
This combination of stealth, ease of exploitation, and high-impact outcomes makes the vulnerability particularly critical for organizations relying on AI-assisted development workflows.
LayerX responsibly disclosed the vulnerability to Cursor on February 1, 2026. The vendor responded on February 5, stating that extensions operate within the same trust boundary as local applications and emphasized that users are responsible for vetting extensions before installation.
As of April 2026, no patch or architectural mitigation has been released. This leaves all users of the platform exposed to potential credential theft.
Until Cursor implements proper isolation controls and secure credential storage, developers should take immediate precautions:
Security experts strongly recommend that Cursor redesign its extension architecture to enforce strict sandboxing and migrate credential handling to system-level secure storage.
Without these changes, the platform remains vulnerable to trivial yet highly damaging attacks.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Cursor AI Extension Token Access Flaw Could Lead to Full Credential Compromise appeared first on Cyber Security News.
ELKHART, Ind. (WOWO) — A high-profile officer-involved shooting in Elkhart remains under active review months…
The Common Man Roadside franchise is expanding again, this time on Manchester Street, less than…
Anita Burroughs was never one for the outdoors growing up — until she moved into…
A key Senate panel opted to gut legislation that would’ve prohibited publicly funded colleges in…
The U.S. Court of Appeals paused a federal judge’s order requiring New Hampshire to take…
Every year, tens of millions of gallons of untreated sewage enter the Merrimack River in…
This website uses cookies.