An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser ...