top of page
perceptive_background_267k.jpg

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into mo…

Published:

2 april 2026 om 22:00:00

Alert date:

3 april 2026 om 17:05:03

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools, Supply Chain & Dependencies

Command injection vulnerability in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. The vulnerability exists in the console.run_module_with_output() function and breaks intended command structure. This causes the Metasploit console to execute additional unintended commands. The flaw can lead to arbitrary command execution and manipulation of Metasploit sessions. Attackers can exploit this by injecting malicious commands through module parameters.

Technical details

Mitigation steps:

Affected products:

pymetasploit3

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page