Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/CyberSecurity News/Cursor AI Extension Exposes Dev Tokens, Full Cred Access Developer
CyberSecurity News

Cursor AI Extension Exposes Dev Tokens, Full Cred Access Developer

A critical access-control vulnerability (CVSS 8.2) has been identified in Cursor, a widely used AI-powered coding environment. This high-severity flaw potentially exposes developer tokens and grants...

Marcus Rodriguez
Marcus Rodriguez
April 30, 2026 2 Min Read
0 0

A critical access-control vulnerability (CVSS 8.2) has been identified in Cursor, a widely used AI-powered coding environment. This high-severity flaw potentially exposes developer tokens and grants full credential access to affected users.

The flaw uncovered by LayerX has allowed any installed extension to access a developer’s API keys and session tokens secretly.

This results in total credential compromise without triggering any alerts or requiring user interaction.

Unlike secure applications that store sensitive secrets in protected operating system keychains, Cursor saves these credentials in an unprotected, local SQLite database.

The database is located at ~/Library/Application Support/Cursor/User/globalStorage/state.vscdb.

Because Cursor lacks access control boundaries between its extensions and this database, any installed extension can read the file.

Exploitation Flow (Source: Layer X)
Exploitation Flow (Source: Layer X)

No special privileges are required, meaning any rogue add-on can extract the plaintext data stored inside.

The exploitation process is simple and requires low attack complexity. A realistic attack scenario involves the following steps:

  • An attacker publishes a normal-looking extension, such as a custom theme or productivity tool.
  • A developer installs the extension without receiving any permission warnings regarding credential access.
  • The malicious extension quietly queries the local SQLite database to find API keys and session tokens.
  • The stolen data is silently sent to a remote server owned by the attacker without any visible user interface changes.

Since many developers use third-party AI services within Cursor, the fallout from this vulnerability can be severe.

Stolen credentials create a direct path to the following risks:

  • Total exposure of session tokens and backend service access.
  • Compromise of linked AI accounts such as OpenAI, Google, or Anthropic.
  • Massive financial losses if attackers rack up automated usage charges on stolen API keys.
  • Unauthorized access to private data, previous chat prompts, and sensitive code metadata.

Vendor Response and Status

LayerX originally reported this issue to Cursor on February 1, 2026. Cursor’s security team acknowledged the report on February 5.

However, it stated that extensions operate within the same local trust boundary as the user.

They argued that any local application with file system access could potentially read this data.

As of April 28, 2026, the vulnerability remains unfixed. The vendor maintains that it is the user’s responsibility only to install trusted extensions.

To properly secure user data, security experts strongly advise Cursor to implement strict isolation boundaries between extensions.

Sensitive credentials must be moved to encrypted, system-level storage, such as the Windows Credential Manager or macOS Keychain.

Until a structural fix is released, developers should rigorously audit their installed extensions and avoid downloading unverified tools from the marketplace.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Linux Kernel 0-Day “Copy Fail” Roots Fail” Every

Next Post

Europol Busts €50M Online Fraud Network: Million Running

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us