Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Command Injection in pymetasploit3 Enables Arbitrary Command Execution
First Time appeared Dan Mcinerney
Dan Mcinerney pymetasploit3
Vendors & Products Dan Mcinerney
Dan Mcinerney pymetasploit3

Fri, 03 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.
Weaknesses CWE-77
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TuranSec

Published:

Updated: 2026-04-03T04:32:23.872Z

Reserved: 2026-04-03T04:28:08.555Z

Link: CVE-2026-5463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T05:16:24.160

Modified: 2026-04-03T05:16:24.160

Link: CVE-2026-5463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:15:47Z