Hey all,
Loving cursor. I wanted to encourage the development team to please keep up-to-date with the upstream VSCode repo, as otherwise there can be major security risks in user extensions which are not automatically updated due to version incompatibility.
For example: there is a known high-severity CVE for the main Python extension: NVD - CVE-2024-49050. This was patched by v2024.20.0.
However, the current version of Cursor is stuck on an old version of the Python extension - version v2024.13.0 (or earlier) - which appears to have the CVE:
This means all Cursor clients that use the Python extension may still be affected by a high-severity CVE until this is patched – and might have been since this CVE was published (and immediately patched) on November 12, 2024.
I think this particular issue (which itself should be patched ASAP) demonstrates a broader problem of out-of-date extensions potentially having known CVEs and not getting patches, which results in publicly documented attack vectors that anybody could look up and exploit. I strongly recommend that the Cursor team prioritise keeping Cursor as up-to-date with the VSCode fork as possible.
I note that I am posting this publicly as this has been a known CVE since November. Attackers wishing to exploit this could have utilised this exploit since then. So this should not be new information.
Love cursor and hoping that this class of issue can be improved.
Thanks!