
The information displayed in the AIM should not be reported as representing the official views of the OECD or of its member countries.
Multiple high-severity vulnerabilities in the Cursor AI-powered coding environment allow attackers to execute arbitrary code on developers' machines and access sensitive credentials, including API keys and session tokens. These flaws highlight significant security risks in AI-assisted development workflows, with some issues remaining unresolved as of April 2026.[AI generated]



























