Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in pymetasploit3 Enables Arbitrary Command Execution | |
| First Time appeared |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
|
| Vendors & Products |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions. | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: TuranSec
Published: 2026-04-03T04:32:23.872Z
Updated: 2026-04-03T04:32:23.872Z
Reserved: 2026-04-03T04:28:08.555Z
Link: CVE-2026-5463
No data.
Status : Received
Published: 2026-04-03T05:16:24.160
Modified: 2026-04-03T05:16:24.160
Link: CVE-2026-5463
No data.