Cursor AI IDE Vulnerability Enables Code Execution via Git Hooks
A high-severity vulnerability was disclosed in the AI-powered development environment Cursor, exposing developers to arbitrary code execution through malicious Git repositories. The flaw, tracked as CVE-2026-26268 with a severity score of 8.1, demonstrates how modern AI-assisted development tools can introduce new attack surfaces when combined with traditional software mechanisms such as version control systems. The vulnerability allows attackers to execute code on a developer’s machine simply by convincing them to clone a specially crafted repository. This significantly lowers the barrier for exploitation, as cloning repositories is a routine and trusted operation in software development workflows. Once the repository is cloned, hidden malicious logic embedded within Git configurations can be triggered automatically without requiring additional user interaction. At the core of the issue is the interaction between Cursor’s AI agent and Git’s built-in features, particularly Git hooks....