It is possible to create a file name that will be appended to the user prompt causing Windsurf to follow its instructions.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2025-47 |
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Windsurf
Windsurf windsurf |
|
| Vendors & Products |
Windsurf
Windsurf windsurf |
Tue, 14 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A prompt injection vulnerability exists in Windsurft version 1.10.7 in Write mode using SWE-1 model. It is possible to create a file name that will be appended to the user prompt causing Windsurf to follow its instructions. | |
| Title | Windsurf Prompt Injection via Filename | |
| Weaknesses | CWE-1427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-10-14T19:11:07.834Z
Reserved: 2025-04-15T21:53:52.386Z
Link: CVE-2025-36730
Updated: 2025-10-14T19:11:03.685Z
Status : Awaiting Analysis
Published: 2025-10-14T17:15:39.623
Modified: 2025-10-14T19:35:56.913
Link: CVE-2025-36730
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:42:51Z