CVE-2026-5463 PUBLISHED

Assigner: TuranSec
Reserved: 03.04.2026 Published: 03.04.2026 Updated: 03.04.2026

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
CVSS Score: 9.3

Product Status

Vendor Dan McInerney
Product pymetasploit3
Versions Default: unaffected
  • affected from 0 to 1.0.6 (incl.)

Credits

  • Abdivasiyev Sunnatillo finder

References

Problem Types

  • CWE-77 Improper neutralization of special elements leading to command injection CWE

Impacts

  • An attacker who can control module option values such as RHOSTS may inject newline characters to execute arbitrary commands in the Metasploit console context. This may allow execution of unintended modules, manipulation of active sessions, and abuse of automated exploitation workflows.