TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Infosecurity Magazine

Cursor Extension Flaw Exposes Developer API Keys

2026-04-29 · Read original ↗

ATT&CK techniques detected

7 predictions
T1176Software Extensions
97%
"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
T1176Software Extensions
89%
"be used to access third - party platforms such as openai, anthropic or google services. this creates several downstream risks : - unauthorized api usage leading to financial loss - exposure of prompts, outputs and metadata - potential misuse of services for further attacks withou…"
T1176.002IDE Extensions
88%
"be used to access third - party platforms such as openai, anthropic or google services. this creates several downstream risks : - unauthorized api usage leading to financial loss - exposure of prompts, outputs and metadata - potential misuse of services for further attacks withou…"
T1176.002IDE Extensions
84%
"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
T1176.002IDE Extensions
79%
"cursor extension flaw exposes developer api keys a high - severity vulnerability in the ai - powered development tool cursor allows installed extensions to access sensitive credentials, exposing api keys and session tokens without any user interaction. according to research by la…"
T1176.001Browser Extensions
73%
"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
T1176Software Extensions
57%
"cursor extension flaw exposes developer api keys a high - severity vulnerability in the ai - powered development tool cursor allows installed extensions to access sensitive credentials, exposing api keys and session tokens without any user interaction. according to research by la…"

Summary

Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX