Tracked informally as “CursorJacking,” the flaw carries a CVSS score of 8.2 and allows any installed extension to silently extract API keys and session tokens without user interaction or elevated permissions.
The issue stems from insecure credential storage and a lack of isolation between extensions and sensitive application data, placing developers and their associated services at significant risk.
Cursor diverges from standard security practices by storing authentication secrets in a local, unencrypted SQLite database rather than leveraging secure storage mechanisms such as macOS Keychain or Windows Credential Manager.
This database resides at a predictable file path on the host system, making it easily accessible.
More critically, Cursor fails to enforce access control boundaries between its extension ecosystem and local storage.
As a result, any extension, regardless of its declared permissions, can directly query the database and retrieve plaintext credentials.
This architectural oversight effectively nullifies the concept of permission-based security within the extension model.
The exploitation process is straightforward and requires minimal attacker effort, making it highly scalable and dangerous in real-world scenarios.
Because the attack operates silently and leverages legitimate extension functionality, detection is extremely difficult for end users.
The implications of CursorJacking extend far beyond local credential exposure. Given the high-privilege nature of developer API keys, attackers can rapidly escalate access and cause widespread damage.
This combination of stealth, ease of exploitation, and high-impact outcomes makes the vulnerability particularly critical for organizations relying on AI-assisted development workflows.
LayerX responsibly disclosed the vulnerability to Cursor on February 1, 2026. The vendor responded on February 5, stating that extensions operate within the same trust boundary as local applications and emphasized that users are responsible for vetting extensions before installation.
As of April 2026, no patch or architectural mitigation has been released. This leaves all users of the platform exposed to potential credential theft.
Until Cursor implements proper isolation controls and secure credential storage, developers should take immediate precautions:
Security experts strongly recommend that Cursor redesign its extension architecture to enforce strict sandboxing and migrate credential handling to system-level secure storage.
Without these changes, the platform remains vulnerable to trivial yet highly damaging attacks.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Cursor AI Extension Token Access Flaw Could Lead to Full Credential Compromise appeared first on Cyber Security News.
The massive Collector’s Edition of Frieren Season 1 Part 2 just got a massive discount…
The massive Collector’s Edition of Frieren Season 1 Part 2 just got a massive discount…
President Donald Trump gives a speech at the World Economic Forum on Jan. 21, 2026…
Peacock's streaming lineup for May features a new original series as well as the streaming…
A handful of major Hollywood studios are going to war over the rights for the…
A farmer harvests corn beside Highway 163 in Iowa. (Photo by Cami Koons/Iowa Capital Dispatch)The…
This website uses cookies.