← Back to Tech & Science

Google, Cursor Patch Critical Security Flaws in AI Tools

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

SAN FRANCISCO (AP) — Google and Cursor on Wednesday patched critical security vulnerabilities in their artificial intelligence tools that could have allowed attackers to execute remote code on user systems.

The fixes address two separate high-severity issues discovered in software widely used by developers. Google resolved a remote code execution vulnerability in its Gemini CLI tool, which researchers rated a perfect 10 on the Common Vulnerability Scoring System (CVSS). The flaw, if exploited, could have allowed an attacker to run arbitrary commands on a victim's machine without authentication.

Simultaneously, Cursor, a popular AI-powered code editor, fixed a prompt injection flaw that enabled code execution. The vulnerability stemmed from how the application processed user inputs, potentially allowing malicious actors to manipulate the AI into generating harmful code or executing unauthorized commands within the development environment.

Novee Security researchers identified both vulnerabilities and coordinated disclosure with the respective companies. The security firm stated that the flaws posed significant risks to developers relying on these tools for daily workflows.

Google's Gemini CLI is a command-line interface designed to help developers interact with the company's Gemini large language model. The CVSS 10 rating indicates the vulnerability was considered the most severe possible, requiring immediate remediation. The company has released an updated version of the software and urged users to upgrade immediately to prevent exploitation.

Cursor, which integrates AI capabilities directly into the coding process, addressed its prompt injection vulnerability through a software update. The flaw could have been exploited by attackers crafting specific inputs that tricked the AI into bypassing safety filters. This type of vulnerability is particularly concerning in development tools where code execution is a core function.

Both companies confirmed the patches were deployed globally on Wednesday. Security experts emphasized the importance of keeping AI tools updated, as these vulnerabilities highlight the evolving threat landscape surrounding artificial intelligence integration in software development.

The coordinated disclosure process allowed both companies to develop fixes before the vulnerabilities were made public. This approach is standard practice in the cybersecurity industry to prevent malicious actors from exploiting known weaknesses.

Developers using older versions of Gemini CLI or Cursor are advised to update their software immediately. Both companies have stated they are monitoring for any signs of exploitation in the wild.

The incidents underscore the growing security challenges associated with AI-powered tools. As these technologies become more integrated into critical workflows, the potential impact of vulnerabilities increases. Security researchers continue to monitor for similar flaws in other AI applications.

Questions remain about whether any users were affected before the patches were released. Both companies have not confirmed any known exploitation of these vulnerabilities. The cybersecurity community continues to assess the broader implications for AI tool security.

The patches represent a significant step in securing the AI development ecosystem. However, the discovery of these flaws highlights the need for continued vigilance as AI tools become more sophisticated and widely adopted.