Cursor’s AI Bug: When Your Coding Assistant Turns Into a Houdini Hacker
Cursor’s AI assistant might go rogue if you don’t update it. Check Point found a vulnerability allowing remote code execution by sneaky tweaks to the Model Context Protocol. Thankfully, Cursor’s latest update demands user approval for changes. So, download version 1.3 before your coding assistant starts freelancing for the dark side!

Hot Take:
Oh great, just when you thought AI was here to make developers’ lives easier, it turns out it might also be inviting unwanted guests to crash the coding party. Thanks to the “MCPoison” bug, we now know AI tools might not just help write code, but they might also help hackers write the next chapter of your digital nightmare. It’s like trusting your dog to guard your steak while you step out of the room. Spoiler alert: you won’t have any steak left.
Key Points:
- Check Point researchers discovered a remote code execution vulnerability in the AI tool Cursor.
- The vulnerability, named “MCPoison,” involves malicious modification of approved MCP configurations.
- Cursor has released an update (version 1.3) requiring user approval for MCP changes, neutralizing the threat.
- Check Point warns of broader AI supply chain risks highlighted by this vulnerability.
- Further revelations about vulnerabilities in AI development environments are expected from Check Point.