CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Multiple Vulnerabilities in AI-Powered IDEs Enable Data Theft and RCE

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Over 30 vulnerabilities, collectively named IDEsaster, have been disclosed in various AI-powered Integrated Development Environments (IDEs). These flaws allow data exfiltration and remote code execution by chaining prompt injection primitives with legitimate IDE features. The affected IDEs include Cursor, Windsurf, Kiro.dev, GitHub Copilot, Zed.dev, Roo Code, Junie, and Cline. The vulnerabilities exploit the interaction between AI agents and IDE features, leading to significant security risks for developers and enterprises using these tools.

Timeline

  1. 06.12.2025 17:24 1 articles · 23h ago

    Over 30 Vulnerabilities Disclosed in AI-Powered IDEs

    Researchers have uncovered over 30 vulnerabilities in various AI-powered IDEs, collectively named IDEsaster. These flaws enable data exfiltration and remote code execution by chaining prompt injection primitives with legitimate IDE features. The affected IDEs include Cursor, Windsurf, Kiro.dev, GitHub Copilot, Zed.dev, Roo Code, Junie, and Cline. The vulnerabilities highlight the need for secure AI integration in development environments.

    Show sources

Information Snippets