Metrics
Affected Vendors & Products
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in pymetasploit3 Enables Arbitrary Command Execution | |
| First Time appeared |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
|
| Vendors & Products |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions. | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: TuranSec
Published:
Updated: 2026-04-03T15:35:09.337Z
Reserved: 2026-04-03T04:28:08.555Z
Link: CVE-2026-5463
Updated: 2026-04-03T15:34:55.762Z
Status : Awaiting Analysis
Published: 2026-04-03T05:16:24.160
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-5463
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:15:47Z