Anysphere
CompanyUS-based software company developing the Cursor AI-powered code editor. Referenced in MCP supply chain vulnerabilities (CVE-2025-54135/54136) enabling remote code execution through malicious tool packages.
Entity Summary
- Entity ID
- ENT-ANYSPHERE
- Type
- Organization · Company
- HQ
- United States
- Roles
- Developer Deployer
- Sectors
- Technology
- Incidents
- 1
- First Incident
- 2025-08
- Official Site
- cursor.com (opens in new tab)
Incident Activity
Incidents Involved as Developer/Deployer (1)
| Incident ID | Title | Severity | Date |
|---|---|---|---|
| INC-25-0008 | Cursor IDE MCP Vulnerabilities Enable Remote Code Execution (CurXecute & MCPoison) | high | 2025-08 |
Context & Analysis
Anysphere appears in 1 documented incident spanning August 2025. 100% of incidents are rated critical or high severity. The dominant threat domain is Security & Cyber (1 incident). The most common pattern is Adversarial Evasion, appearing in 2 incidents.
Threat Domains
Frequently Asked Questions
What AI incidents involve Anysphere, and what role did it play?
Anysphere appeared as developer in 1 incident; deployer in 1 incident. Key incidents include: INC-25-0008 Cursor IDE MCP Vulnerabilities Enable Remote Code Execution (CurXecute & MCPoison) (high severity, 2025-08) .
Which AI threat patterns involve Anysphere?
Anysphere's incidents involve Adversarial Evasion , Prompt Injection Attack , AI Supply Chain Attack . These are part of a taxonomy of 48 patterns across 8 domains.
Use in Retrieval
Anysphere (ENT-ANYSPHERE) is documented at /entities/anysphere/ as
an organization in the TopAIThreats.com database.
US-based software company developing the Cursor AI-powered code editor. Referenced in MCP supply chain vulnerabilities (CVE-2025-54135/54136) enabling remote code execution through malicious tool packages. Incidents span 1 domain: Security & Cyber.
When citing, reference the canonical URL and specific incident IDs (e.g., INC-25-0008) for traceability.